Threat Model for IIL LIPPA Project: Data Security and Analysis Report

Verified

Added on  2020/02/24

|4
|440
|166
Report
AI Summary
This report provides a detailed threat model for the LIPPA project, focusing on data security and risk analysis. The report begins with an introduction outlining the purpose of the threat model and its significance for the IIL Location Intelligence for Policy Profile Assessment (LIPPA) project. It then describes the application of the LIPPA project, explaining how the Risk Analysis Project (RAP) functions within the IIL data center. The core of the report identifies and defines several threats, including storage threats, security threats, access nomination threats, and data access security threats. Each threat is described with its potential impacts and implications for the project's security and functionality. The report references key literature on risk analysis and threat modeling to support its findings. This analysis is crucial for understanding and mitigating potential vulnerabilities within the LIPPA project and ensuring the security and reliability of its data and operations.
Document Page
Running head: THREAT MODEL
IIL LIPPA Project Threat Model
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1THREAT MODEL
1. Introduction
The primary purpose of the report is to prepare a threat model for IIL Location
Intelligence for Policy Profile Assessment (LIPPA) Project. The threat model identifies major
threats that have significance over the LIPPA project and RAP application utility (Miller &
Ager, 2013). This model clearly relates identified threats along with specific security,
performance, and cost consideration.
2. Application of LIPPA Project: Description
RAP (Risk Analysis Project) application is the foremost and existing Risk Analysis and
Impact Analytics service provider to IIL. RAP is hosted to virtual in-house platform in IIL Data
center. This particular risk analytics solution is effective for defining singular platform with
supporting enormous amount of generated data from in-house and cloud platforms.
3. Threat Identification and Definition
The threat identification and definition is discussed as following:
1. Storage Threat: The storage requirement is primarily 10 TB and later it is
estimated that 10 TB backup storage is required for extension of database (Olivo,
Santin & Oliveira, 2013). Therefore, backup storage should be attached with
existing storage of database; otherwise chance of losing data exists.
2. Security Threat: Big data should be implemented in this scenario, for cloud
storage security options. Henceforth, the threat exists under the circumstance of
Document Page
2THREAT MODEL
external data loss risk such as certain incidents such as shutdown of servers,
natural disasters, and others.
3. Access Nomination Threat: The access should be restricted under 10 people
under one single active admin. Therefore, the threat should be mitigated with
admin assistance to manage 10 people.
4. Data Access Security Threat: Data access should be restricted under some
appropriate domain control in order to control user view and their utilization of
security plan (Miller & Ager, 2013). The security plan can justify the use of
secure access with precautions.
Document Page
3THREAT MODEL
References
Miller, C., & Ager, A. A. (2013). A review of recent advances in risk analysis for wildfire
management. International journal of wildland fire, 22(1), 1-14.
Olivo, C. K., Santin, A. O., & Oliveira, L. S. (2013). Obtaining the threat model for e-mail
phishing. Applied soft computing, 13(12), 4841-4848.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]