Analyzing Risk Assessment and Disaster Recovery in Network Security

Verified

Added on  2023/04/07

|5
|622
|433
Report
AI Summary
This report provides an analysis of network security threats and proposes a risk assessment and disaster recovery plan. It identifies unstructured threats, internal threats from employees, and external threats from hacking and viruses. The report emphasizes the importance of continuous monitoring, segmentation of networks, and integrating organizational schema to recover from security breaches. A control plan is outlined, rating the importance of various network security risks such as unauthorized access, theft, data loss, and virus attacks, along with corresponding measures like data breach risk intelligence systems, automatic monitoring, backup recovery, and managed anti-virus measures. The study concludes that continuous monitoring and a robust organizational schema, potentially facilitated by a risk management company, are crucial in addressing network security threats.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: RISK ASSESSMENT AND DISASTER RECOVERY SCENARIO
Risk Assessment and Disaster Recovery Scenario
Name of the University:
Name of the Student:
Authors Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1RISK ASSESSMENT AND DISASTER RECOVERY SCENARIO
Introduction
A critical element in developing a secure network is to undertake analysis of different
risk levels faced by workstations or networks along with developing a control plan through rating
importance of each risk. The objective of the paper is to analyse the risks in the organisational
context along with offering suitable risk assessment and control plan for dealing with threats to
the network security.
Nature of Network Security Threats and Controls
Unstructured threats like systems being attacked unknown to perpetrator- This
threat can be faced by network security systems through being infected that is unknown
to the perpetrator. The most common methods through which data loss disaster or data
breach takes place is by allowing access to increased number of employees, stolen
devices along with involvement of other organisations systems within the supply chain
(Sandberg, Amin and Johansson 2015)
Internal threats from existing employees those have authorised access to organisational
information increasing changes of security breach from internal attacks. Misuse of such
data can be done by these individuals those are usually an opportunistic or unhappy past
employees.
External threats from hacking and viruses where the hackers or individuals attain
unauthorised access to confidential data of the organisations (White, Fisch and Pooch
2017).
Document Page
2RISK ASSESSMENT AND DISASTER RECOVERY SCENARIO
Recovery from Security Breach
Integrating overall organisational schema
Continuous monitoring- This can be ensured by the organisations in addressing its
threats faced from in their network security and workstations through hiring a risk
management company (Howell 2017). This can facilitate companies in attaining better
problem-solving approaches for preventing or resolving cybercrime. Cyber criminals can
attack vulnerable spots any time so regular monitoring is important in workstations that
can decrease chances for unauthorised hacking within the system.
Segmentation of networks from data and other business functions- In case criminals
get within network security system they can reach nodes of data or ways to shift money
out of business. For this reason separating systems makes it simpler to identify criminals
and deal with them (Sandberg, Amin and Johansson 2015).
Control Plan through Rating Importance of Each Network Security Risk
Network Security Risks Rating (1 to 5 where 1 indicates
low importance and 5
indicating high importance)
Control Plan
Unauthorized access from an
organisations internal and the
external sources
2 Implementing data breach risk
intelligence systems
Theft through stealing, changing
and destroying information by
breaking into computer systems
4 Automatic monitoring and
maintenance
Data loss or corruption through 3 Backup and inventory recovery
Document Page
3RISK ASSESSMENT AND DISASTER RECOVERY SCENARIO
hardware failure or vandalism
through natural disasters
Virus attacks or rogue security
software that can be used by
scammers for internet fraud
5 Managed anti-virus measures
Conclusion
It was gathered from the paper that threats from hacking and viruses exist where the
hackers or individuals attain unauthorised access to confidential data of the organisations. In
dealing with same, continuous monitoring and integrating overall organisational schema can be
ensured by the organisations in addressing its threats faced from in their network security and
workstations through hiring a risk management company.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4RISK ASSESSMENT AND DISASTER RECOVERY SCENARIO
References
Howell, P., 2017. Security Risk Assessment of the R&E Network.
Sandberg, H., Amin, S. and Johansson, K.H., 2015. Cyberphysical security in networked control
systems: An introduction to the issue. IEEE Control Systems Magazine, 35(1), pp.20-23.
Shameli-Sendi, A., Aghababaei-Barzegar, R. and Cheriet, M., 2016. Taxonomy of information
security risk assessment (ISRA). Computers & security, 57, pp.14-30.
White, G.B., Fisch, E.A. and Pooch, U.W., 2017. Computer system and network security. CRC
press.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]