Monday, August 12, 2019

Risk Assessment Research Paper Example | Topics and Well Written Essays - 2500 words

Risk Assessment - Research Paper Example However, there is no security expert tasked with ensuring secure operational environment. The company’s network is segregated into segments. The Trusted Computing Base is the internal network within GFI. This segment hosts company’s mission critical systems that are essential to the company’s operations that affect the financial situation. The most used systems in the enterprise are Oracle database and email. GFI cannot afford a network outage due to the nature of activities in it undergoes. It financial activities will be adversely affected since they depend on network availability and stability. As it is, GFI has experienced DoS attacks twice this year, and its Oracle database and email servers have been compromised for a total downtime of one week. The recovery process cost the company $25,000 and an estimated loss of $1, 000,000 was recorded in addition to customer confidence. In this study, I am going to undertake risk assessment based on GFI network diagram. Knowledge of the vulnerabilities existing in the network will facilitate the design of a solution to counter the threats. Risk assessment will be conducted ion GFI network to establish the likely areas of failure. Risk assessment will focus on managerial, operational and technical aspects that are prone to vulnerabilities and which can be exploited by attackers. Once vulnerabilities have been established, it is easy to tailor safeguards to counter them. Security safeguards and controls are measures undertaken in the company, or added to the information technology environment to mitigate the risks associated with the operation and management of resources. A risk assessment procedure is conducted to determine the adequacy of security controls employed by Global Finance Incorporation. The risk assessment process adopts a methodology and, in this case, a qualitative methodology is preferred. It focuses on the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.