ITC596: IT Risk Management Assessment of Cyber Security System

Verified

Added on  2024/07/01

|22
|6864
|181
Report
AI Summary
This report presents an IT risk assessment conducted for Gigantic Corporation's cyber security system. It translates technical risks into business language to facilitate decision-making, addressing the interface between technical experts and stakeholders. The assessment covers risk management policies, procedures, and the overview of technology associated with the cyber security project. It describes the purpose, scope, and potential risks, threats, and vulnerabilities of the system. The report includes a detailed risk assessment based on threats, vulnerabilities, and consequences, identifying key threat agents and proposing mitigation strategies. Recommendations are provided to enhance organizational growth and improve the cyber security network system, including regular updates, adherence to company rules, and proactive measures like firewalls and data backups. The report concludes with a summary of protection mechanisms, such as data encryption and intrusion detection, and emphasizes the importance of continuous risk control and management for organizational data protection. This document is available on Desklib, a platform offering a wide range of study tools and solved assignments for students.
Document Page
ITC 596: IT RISK MANAGEMENT
ASSESSMENT 3

Cyber security

1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Executive summary
......................................................................................................................... 3
1. Introduction
..................................................................................................................................6
2. Overview of risk assessment
....................................................................................................... 8
3. Risk Assessment based on Threat, Vulnerability, and Consequences
.........................................9
3.1 Risk Assessment
.................................................................................................................... 9
3.2 Key threat agents
..................................................................................................................10
3.3 Mitigating the risks
.............................................................................................................. 16
3.4 Recommendations
................................................................................................................ 16
4. Summary
....................................................................................................................................18
4.1 Literature review of protection mechanism
.........................................................................18
5. Conclusion
................................................................................................................................. 20
6. References
..................................................................................................................................21
2
Document Page
Executive summary
The report is reflected by an IT risk assessment lead consultant to the Gigantic Corporation’s

management system. This report describes a cyber security system which aims to provide

security and protection from cyber attacks and crimes. The report also involves the translation of

technical risks in the form of business language for facilitating effectual decision making. The

report also describes the interfacing between technical experts and stakeholders. The report is

based on management of risks that occur due to an implementation of cyber security project. The

report discusses policies and procedures of an organization in the context of cyber security.

The main part of report covers the purpose, scope, overview of technology and risk assessment.

In this report, the cyber security system is described as the risk assessment project which

involves various pros and cons. An overview of risk assessment is described along with their

cause and effects. The risk management approaches and methods also provided with some risks

and threats. The impact of threats and vulnerabilities are also described in the below report along

with threat agents. The losses of confidential data and information are also described in risk

assessment project report. The report also explains a cyber security system of an organization

which leads to some risks and difficulties. The threats and their description are presented by a

table that defines different threats of cyber security. The vulnerabilities due to threat agents are

shown in a tabular form. The risk assessment area involves various factors with mitigation and

management procedures. The legal term and policies of company are also included for

initializing the risk assessment project.

The cyber security system is a design and practices which protects the networks and data from

the attack, damages, and authorized access. The effective cyber security reduces the threats of

attacks and protects businesses from unauthorized exploitation with respect to networks and

devices. This report provides a solution to identify attackers and criminals by using this risk

assessment approach. There are also some recommendations provided that impact the growth of

an organization. At last, a solution is provided along with some recommendations based on a risk

assessment report. A summary is described in the context of an overall report on the cyber

security of an organization. The overview of cyber security is explained as follows:

The cyber security plays a vital role in IT industry that manages network system to protect

information and data. The increasing technology and smart devices create complexity for

protection. The organization faces many challenges and risks with cyber security that decays the

potential growth as well as reputation. The internet connected systems include hardware and

software tools and data that might be protected through cyber security approach. The

organization leads to loss of computational data and physical data due to cyber attacks. The

unauthorized access of data and information can be protected through both physical and cyber

security system. The cyber system involves data loss and information theft due to external and

internal attacks. The cyber security comprises the information security that maintains the

confidential data and information of company which included in the risk management report.

Some recommendations are included in this report as mention below:

Information update
Follow the company's rules and procedures
Updating the software version
Insurance of cyber data
Website protection with security layers
3
Document Page
Data backup on regular basis
Enable firewall network and firewall applications
Follow cyber security term and conditions
Check network authorization and protection
Installation of cameras and scanners at organizations
Prevention from data loss
The report also contains a brief summary of the risk management report which involves the

implementation of security processes. The result finds some methods for prevention and

mitigations that controls the cyber risks of an organization. The techniques and recommendations

are useful for financial growth as well as business growth.

The mitigation steps and recommendations are described for improvement in cyber security

network system which can identify the threats and risk. The risk measures and their controls also

implemented with the help of some mitigation strategies and recommendations.

System maintenance and physical security
Identify external and internal attackers
Improve the security policies
Password generation and layer prevention
Documentation for legal policies and accessing of information
Protect website and information with the segmentation method
Develop a training system for employees
Employ strict policies for vendor and outsiders
Monitoring of cyber prevention system
Use IPS and IDS for protection
Installation of the latest version of the software
Detection of malware and hackers
Use antivirus applications for strong security
Identify the criminal activity through spam emails and unauthorized user
Risk prevention devices and planning
Prevent organization information from unauthorized access
Plan a risk management regarding IT industry
The cyber security risk assessment report also includes the summary of the overall report which

depicts some protection mechanisms. The protection mechanisms are introduced for increasing

the network security of an organization. Some key points are included in the protection

mechanism that allows the user to develop in the cyber system.

The protection mechanism overview involves some key methods for improvement as shown

below:

Encryption of data
Enabling firewalls
Employ a protection layer and protection sphere
Use of intrusion prevention and intrusion detection
Scanning and auditing process
Vulnerability scanners
Backup of data
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Software updating process and installation
Secure customer data and information
The conclusion also included in the risk management report which describes the overall project

implementation process in IT risk assessment control framework. The risk control techniques

and methods also defined regarding in an organization. Cyber security risk assessment and

management helps the corporation from data and information loss.

5
Document Page
1. Introduction
The risk with technology is increasing day by day as mentioned in the IT risk assessment report.

The report is based on Risk assessment in IT Corporation with cyber security. As a lead

consultant of ‘IT risk assessment’ in Gigantic Corporation cyber security, the management report

is described. The detail information of cyber security in Gigantic Corporation has been presented

with management report. The term cyber security defines the management and mitigation of risk

assessment in organizations to protect their critical assets. The cyber security is a priority for any

organization to protect their data and information form hacking. The cyber risk is increasing

rapidly in few organizations that impact the organization’s assets. The risk management of cyber

security system describes threats and vulnerabilities.

The cyber security plays a vital role in IT industry that manages network system to protect

information and data. The increasing technology and smart devices create complexity for

protection. The internet connected systems include hardware and software tools and data that

might be protected through cyber security approach. The organizations face many difficulties

due to loss of computational data and physical data. Cyber system creates several risks in

transferring and receiving the data that can mitigate through cyber security model and

approaches (
Ashibani, et. al., 2107). Cyber security also involves the cyberspace which utilizes
electronic communication medium for online global network system with the help of virtual

networks. The Cyberspace is a big platform of computer networks which provide facility to

employ IP and TCP protocols for exchanging the worldwide information through

communication. The virtual world and interactive environment is the main feature of cyberspace

which provides a wide range of network over the worldwide.

A cyberspace helps user to provide different communication medium via various methods and

techniques. It also permits users to exchange the information, interaction, switches ideas,

engagement of social activities; develop business ideas and other communication activity (
Chen,
et. al., 2018)
. The cyberspace helps to control the risk and overcome the threats through an
interactive environment.

Purpose

The purpose of the report is to provide a risk assessment report on management by interfacing

between stakeholders of company and technologists. The report will explain the technical

difficulties in Gigantic Corporation with the cyber security. Apart from this, the threats,

vulnerabilities, and consequences also will be discussed on the behalf of IT control framework.

The impact of risk assessment with the result also will be identified for mitigation plan.

Project scope

The project scope includes some benefits of cyber security system in an organization where some

factors affect the security. The risk assessment is developed for interfacing of web applications

in a business environment. The risk management covers all policies and procedures of

organization which help to maintain the data and information. The assessment includes various

methods and models which lead to improving that cyber security system. It will help to protect

legal and confidential information of company. The cyber security risks impact the

organizational security and protection which identifies some threats and vulnerabilities. The

assessment report collects the all affecting factors to resolve the management issues.

6
Document Page
Apart from this, the cyber security model is useful for maintaining, transmitting and receiving
the data and information with control measures and these are also useful for prevention of loss

and damage. The organizational security system analyses some threat agents and attackers but

according to provided scenario, the technologist and stakeholders will discuss some

recommendations. These recommendations will helpful for enhancing security in Gigantic

Corporation and prevent financial loss.

7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2. Overview of risk assessment
The IT risk assessment in an organization identifies and controls the technical difficulties and

risks that occur due to cyber attacks. The risk assessment and their management are useful for

prevention form loss of data and security. The management of risk will help in improving the

cyber security in organizations that will also save both time and money (
Alali, et. al., 2018).
Figure
1: Model for risk assessment
Source: (Mani, et. al., 2015)

The risk assessment model presents the several threats and source which creates some threat

event. The benefit of this model involves some security controls and their vulnerabilities that

affect the organizational growth.

The strategies and plans for identifying and removing the cyber risks in an organization with an

opinion of decision makers & technologists:

Identifying cyber risk an organization's assets that could be affected form attacks.
Identify the cyber risks and their impact on organization so the decision makers can
implement their ideas (
Abdo, et. al., 2018).
Analyze the risk management and security plans for the protection of assets and values.
Evaluate security threats and challenges that can be occurred due to cyber attacks.
Plan a strategy of security risk management that can prevent form losses of data.
Recognize the threats in a particular system and plan a strategy for execution with
recommendation.

Recognize the vulnerability of the cyber security system and find out the solutions.
Provide security measures and controls, bug fixes and mitigations for risk management in
IT sector.

Design a protocol for minimizing the risk assessment and cyber security system.
The management of IT risk includes the appropriate methods for execution the cyber risk with

technical team (
Mayer, et. al., 2018). Some threats and vulnerabilities can be identified through
cyber security components.

8
Document Page
3. Risk Assessment based on Threat, Vulnerability, and Consequences
3.1 Risk Assessment

The term threat to cyber security defines a serious or possible danger that causes harm to the

network system. Some threats of cyber security system that may or may not occur in corporation

are mentioned below:

Unauthorized access of data - The unauthorized access in the cyber security system of a
company can be harmful to information leakage. Unauthorized access includes the access

to websites, systems, server and programs with the help of another ID and account. The

hackers can easily detect or identify the pin or password for access the confidential data

(
Shin, et. al., 2017).
Spoofing of credentials- The malicious person or party is the main cause of spoofing
that loss the data. A spoofing attack occurs in a cyber security system when a suspicious

or unauthorized user attacks on the network system. It may be in any form such as

website spoofing, e-mail spoofing, password spoofing, and IP spoofing.

Jamming- The jamming attack on cyber security impacts the security system of an
organization that leads to loss of information. Jamming breaks the signal and information

that impacts the communication system of an organization.

Denial-of-service (DoS) attack- Hackers and attackers send request to network for
authentication of accessing legal data. In cyber security system, the DoS prevent service

from attack but it interrupts a specific system.

Malicious attack- In cyber security system, a malicious code is used to theft data and
damages the security system. It generates vulnerabilities in the system that causes the

potential damage to security.

Man-in-the-middle attack- In cyber security system, the man-in-the-middle attack uses
to interrupt connection between the two-person or parties. The attackers relay the

communication and steal the confidential information through a conversation between

two parties.

The threats and risks are identified through evaluation of a cyber security framework which

describes different stages of risk and threat occurrence. The frame involves the steps to identify

the risk to their recovery mechanisms. The below framework describes the process of cyber

security which will be helpful for risk assessment project and risk management. The cyber

security in organization utilizes the below framework to execute the project in risk management

which will help in dealing with technical difficulties that occurs due to physical or non-physical

risk (
Chen, et. al., 2018).
9
Document Page
Figure 2: Cyber security framework
Source: (
www.threatprotect.co.uk, 2018)
Some threats and threat agents are defined in below table with their impact on risk assessment

project. The below threats depicts the losses and harms which are the main cause of cybercrime.

3.2 Key threat agents

The threat agent could be any human or malicious attacker or can say a system application and

software which create threats in cyber security. The threat agents are mentioned below:

Terrorists
Malicious codes
Hackers and attackers
Organization’s employees
Corporation competitor
Thieves and robbers
Software applications
Viruses
Malware
Table 1: Threat Agents

Threats
Threat agents Description Impact
Buffer overflow or

Denial of service

attack

Professional

criminals and

terrorists

This kind of threat

leads to legal loss of

organizations data.

High

Bypass
Thief and This leads to damage High
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
authentication professional attackers to the security
system.

Unauthorized access
Malicious attacker The unauthorized
access impacts on the

network system and

cause of data loss.

High

Jamming
Professional hackers The system or
network requires the

large setup of

equipment and

communication

medium which

affects the

transmission of data.

High

Man-in-the-middle

attack

Attackers
The attacker collects
information that

causes the

information & legal

loss.

High

Malicious code
Malicious hacker and
coder

The malicious code

creates viruses in a

cyber system that

leads to corrupt files

and data.

High

Analysis:

The above table explains the various threats of cyber security that are the main cause of risks.

The threat agent is also described which creates threats in cyber security of an organization and

impacts of threats on system and network is also presented. The above table describes the threats

analysis with threat actors.

Table 2: Risk assessment, threats, and vulnerabilities

S. No.
Risk asset Vulnerability Threat Value of asset
1.
Networks Wrong identity Unauthorized
access to data

4

2.
Networks Wrong identity Man-in-middle
attack

4

11
Document Page
3. Networks Wrong identity Spoofing of
credentials

4

4.
Check in
procedure

Back up issue
Malicious attack 4
5.
Scanners and
detectors

Weak network

communication

Jamming
3
6.
State databases Capacity of
device

Denial of service

attack

4

7.
State databases Lack of
transparency

principle

Data access in

an unauthorized

way

4

Analysis:

The above table evaluates the risk assessment, threats, and vulnerabilities along with asset value.

Each threat explains the vulnerability and asset value and also defines which risk is assessed

according to threat.

Cyber security risks

Online transactions, emails, online marketing, social media, and other online activities are the

main causes of cyber security risk that affects the management and financial growth of company.

A ‘cyber risk’ in an organization occurs due to cyber security system errors and some threats.

The loss of data and damages in IT system affects the reputation of company as well as financial

growth. The value of threats and vulnerability explains the actual risk in which various harmful

elements are included. A risk in cyber security leads to cyber loss which affects the security,

trust, and information (
Ganin, et. al., 2017).
Some common security risks and threats are described as follows:

Viruses-
The viruses are any kind of software and program that transferred into a system for
corrupting the files and data. The virus can delete and corrupt the system and its program and

also damage the information.

Malicious spyware
- This type of threat is generated by cyber attackers or criminals to discover
the information of victims. The Trojan application is useful for malicious spyware.

Botnet-
Hackers and attackers create a group that connects each computer to internet with the
help of Trojan horse and it is called a zombie. These botnets increases virus attacks in the cyber

security system as well as denial of attack.

Spam
- The spam is an unnecessary message that arrives in the email or email inbox. It is process
of sending and receiving information in unauthorized way and creates junk mails. It can cause

security and information loss due to frauds.

12
chevron_up_icon
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]