Access Millions of academic & study documents

ASM 655 Management of Information Security Individual Assignment Quiz

Content type
User Generated
Subject
Computer Science
Type
Exam Practice
Showing Page:
1/5
MUHAMMAD RIDHWAN BIN RIPIN
2018674246
BA2325C
ASM655 - Management of Information Security Individual Assignment 2 (10%)
RISK MANAGEMENT: ASSESSING RISK
a) Assume that a factor analysis has been carried out, identify five (5) most valuable
information assets for ShopTillDrop.com. (Deliverable: Prioritized list of assets)
1. Customer database such as online shoppers
2. Seller database
3. Human Resource database
4. Accounting database
5. Research and development
b) Identify all possible threats for your information assets identified above that may
have a chance to occur for consideration of your team. (Deliverable: Prioritized list
of threats)
1. Human error or failure such as accidents, employee mistakes
2. Software attack such as viruses
3. Espionage or trespass such as unexpected attack by a group of hackers
4. Technical software failures or errors such as bugs which are left the customers of
ShopTillDrop.com with denial of service
5. Theft such as illegal confiscation of equipment or information
6. Technological obsolescence such as outdated technologies
7. Sabotage or vandalism
8. Technical hardware failures or errors
9. Information extortion
10. Deviations in quality of service from service providers

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
MUHAMMAD RIDHWAN BIN RIPIN
2018674246
BA2325C
c) Carry out a vulnerability assessment of all possible threats identified above.
(Deliverable: List of vulnerabilities that exist)
Threat
Possible Vulnerabilities
Human error or failure
Employees or contractors may cause an outage if configuration error is
made
Software attack
-IP is vulnerable to a denial-of-service attack.
-Outsider IP fingerprinting activities can reveal sensitive information
unless suitable control is implemented
Espionage or trespass
A router has little intrinsic value, but other assets protected by this device
could be attacked if it is compromised.
Technical software failures
or errors
Vendor-supplied routing software could fail and cause an outage
Theft
A router has little intrinsic value, but other assets protected by this device
could be attacked if it is stolen.
Technological
obsolescence
If it is not reviewed and periodically updated, a device may fall too far
behind its vendor support model to be kept in service.
Sabotage or vandalism
IP is vulnerable to a denial-of-service attack.
Devices may be subject to defacement or cache poisoning.
Technical hardware
failures or errors
Hardware could fail and cause an outage.
Power system failures are always possible.
Information extortion
A router has little intrinsic value, but other assets protected by this device
could be attacked if it is compromised.
Deviations in quality of
service from service
providers
Unless suitable electrical power conditioning is provided, failure is
probable over time.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
ASM655 - Management of Information Security Individual Assignment 2 (10%) RISK MANAGEMENT: ASSESSING RISK a) Assume that a factor analysis has been carried out, identify five (5) most valuable information assets for ShopTillDrop.com. (Deliverable: Prioritized list of assets) 1. Customer database such as online shoppers 2. Seller database 3. Human Resource database 4. Accounting database 5. Research and development b) Identify all possible threats for your information assets identified above that may have a chance to occur for consideration of your team. (Deliverable: Prioritized list of threats) 1. Human error or failure such as accidents, employee mistakes 2. Software attack such as viruses 3. Espionage or trespass such as unexpected attack by a group of hackers 4. Technical software failures or errors such as bugs which are left the customers of ShopTillDrop.com with denial of service 5. Theft such as illegal confiscation of equipment or information 6. Technological obsolescence such as outdated technologies 7. Sabotage or vandalism 8. Technical hardware failures or errors 9. Information extortion 10. Deviations in quality of service from service providers MUHAMMAD RIDHWAN BIN RIPIN 2018674246 BA2325C c) Carry out a vulnerability assessment of all possible threats identified above. (Deliverable: List of vulnerabilities that exist) Threat Possible Vulnerabilities Human error or failure Employees or contractors may cause an outage if configuration error is made ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4