Access over 20 million homework & study documents

Risk assessment

Content type
User Generated
Rating
Showing Page:
1/10
1
Risk Assessment
Student’s Name
Institutional Affiliation
Course Name
Instructor’s Name
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/10
2
Introduction
Cybersecurity concerns have gained much importance in institutions, including
educational establishments. The security flaws of cybersecurity risks are being exposed due to a
rise in the number of breaches of various types (Shen, Chen, & Su, 2017). Because of
advancements in digital technology, data security is a crucial factor today. Although scientific
researchers advance technology to optimize the effectiveness of operations, some people use
modern technological advances to carry out harmful activities (Peltier, 2013). For example,
cyber attackers can infiltrate a network and plant malware or steal sensitive documents,
disrupting the entire operation. In this regard, the National Institute of Standards and Technology
(2012) recommends that assessing the inherent dangers in a system assists in preventing the
negative impacts of undesired penetration.
Description
The case under deliberation is a putative public educational institution that has
incorporated a database containing personal and financial details concerning students and is
readily available to school personnel. Notably, student data in the database includes contact
information, test scores, learning diagnoses, disciplinary documents, and other identifying details
that may be exposed. The emphasis of this research is a flaw in the data system, which allows an
attacker to access the information regarding students at school. The cybercriminals specifically
use the data to issue threatening messages to parents and students in exchange for cryptocurrency
ransom information; or else, the victim's personal and sensitive data is revealed to the public. In
other instances, cybercriminals may gain access and take control of the school's data system.
They then claim extortion money, failure to which they jeopardize all operations that use the
designed data system. Notably, the availability of information in the institution's database

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/10

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 10 pages?
Access Now
Unformatted Attachment Preview
1 Risk Assessment Student’s Name Institutional Affiliation Course Name Instructor’s Name Date 2 Introduction Cybersecurity concerns have gained much importance in institutions, including educational establishments. The security flaws of cybersecurity risks are being exposed due to a rise in the number of breaches of various types (Shen, Chen, & Su, 2017). Because of advancements in digital technology, data security is a crucial factor today. Although scientific researchers advance technology to optimize the effectiveness of operations, some people use modern technological advances to carry out harmful activities (Peltier, 2013). For example, cyber attackers can infiltrate a network and plant malware or steal sensitive documents, disrupting the entire operation. In this regard, the National Institute of Standards and Technology (2012) recommends that assessing the inherent dangers in a system assists in preventing the negative impacts of undesired penetration. Description The case under deliberation is a putative public educational institution that has incorporated a database containing personal and financial details concerning students and is readily available to school personnel. Notably, student data in the database includes contact information, test scores, learning diagnoses, disciplinary documents, and other identifying details that may be exposed. The emphasis of this research is a flaw in the data system, which allows an attacker to access the information rega ...
Purchase document to see full attachment
Tags: Instructions This assignment will use NIST Special Publication 80030 available at httpcsrcnistgovpublicationsdrafts80030rev1SP80030Rev1ipdpdf or in t from ISP appliance to connections within your home location a work oriented network or a public network eg public library commercial venue free Wifi hotspot In this assignment populate the entire adversarial and a nonadversarial risk assessment tables using the format provided by Table I5 and Table I7 in NIST SP 80030 This wherein you will use these populated tables to gain insight in the selected systems risks ie how did you arrive at the level of risk indicated in your tables apply knowledge from this course ie did you use OCTAVE or apply relevant information security metrics ie QUANT or QUAL and discuss the considerations that should go into an actual information security risk assessment discussion limited to adversarial and nonadversar at a minimum as part of your deliverable For this assignment a brief description of your selected information system must be included and your inputs for the Tables I5 and I7 created and populated Your paper Sunday Your writing assignment will be automatically ran through TurnItIn to aid in preparing for your Final Research Paper and also as a tool to he Papers and Case Study writing products will be submitted in compliance with APA style guidelines It is recommended that students try to adhere to a consis which is described below All Assignments and Case Study writing products should be submitted inside the electronic classroom unless classroom access is not possible and other arrangements h and Case Study writing products should contain a Cover Page with paper title course identifier student name professor name and date of paper All Assignments and Case Study writing products should be typewritten in Word format deviations from Word need prior professor approval in doublespaced format ensur and Case Study writing products should have 1 margins all around 05 paragraph indentation All Assignments and Case Study writing products should employ a running header and page numbers appropriately placed All Assignments and Case Study writing products should use section headings standard section heading use is encouraged eg Introduction Discussion Conclusion Figures and Tables are allowed but will not count toward the total page count and must be properly labeled All Assignments and Case Study writing products citation formatting both in text and in the References page should conform to APA style guidelines CITATION AND R in which case students should follow the guidelines set forth in Publication Manual of the American Psychological Association Washington DC American Psychological Association
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4