Geschrieben von Student*innen, die bestanden haben Sofort verfügbar nach Zahlung Online lesen oder als PDF Falsches Dokument? Kostenlos tauschen 4,6 TrustPilot
logo-home
Abschlussarbeit

IT Security Risk Assessment

Bewertung
4,3
(4)
Verkauft
2
seiten
47
Hochgeladen auf
11-12-2018
geschrieben in
2018/2019

This particular assignment is the cumulative project which deals with assessing risk within an organization in an information technology environment. This report explains the assessment of different areas (risks) of concern and an analysis of those risks. It gives an idea of what a risk assessment looks like in the real world. When I have written this 10 page report, it was a massive and a very intense project. I have spent 13 hours a day for 8 days straight working on this analysis report, but in the end, I have receive a 74 out of 75 points on this project.

Mehr anzeigen Weniger lesen
Hochschule
Kurs

Inhaltsvorschau

Port of Seattle IT Security Risk Assessment

Joseph Sanchez
Central Washington University


December 4, 2018





,Table of Contents
Executie Summary.....................................................................................................................................4
Oieriiew of Assessment..........................................................................................................................4
Identied Risks and Common Risk hndemes..............................................................................................4
Summary of Proposed Mitiaton Actiites.............................................................................................4
Risk Assessment Report...............................................................................................................................4
Oieriiew of Risk Assessment..................................................................................................................5
Risk Measurement Criteria......................................................................................................................5
Scope of Assessment...............................................................................................................................6
Security Controls Assessed......................................................................................................................6
Areas of Concern (or Risks)......................................................................................................................8
Disiruntled employee may access and release employee’s account informaton..............................8
Hacker iain access to employee’s account informaton.....................................................................9
An intruder could iain access to an access panel at tde kiosk macdine..............................................9
An intruder interceptni tde Wi-Fi siinal to obtain informaton.......................................................10
A tdief iainini access to tde locked container...................................................................................12
Risk Heat Map....................................................................................................................................13
Risk Mitiaton.......................................................................................................................................14
Risks to Accept...................................................................................................................................14
Risks to Defer.....................................................................................................................................14
Risks to hnransfer................................................................................................................................14
Risks to Mitiate................................................................................................................................14
Reference List............................................................................................................................................18
Octaie Alleiro Worksdeets.......................................................................................................................19
Worksdeet 1..............................................................................................................................................19
Worksdeet 2..............................................................................................................................................20
Worksdeet 3..............................................................................................................................................21
Worksdeet 4..............................................................................................................................................22
Worksdeet 5..............................................................................................................................................23
Worksdeet 6..............................................................................................................................................24
Worksdeet 7..............................................................................................................................................25
Worksdeet 8..............................................................................................................................................26

,Worksdeet 9a............................................................................................................................................28
Worksdeet 9b............................................................................................................................................30
Worksdeet 9c.............................................................................................................................................32
Worksdeet 10............................................................................................................................................34
Worksdeet 10............................................................................................................................................36
Worksdeet 10............................................................................................................................................38
Worksdeet 10............................................................................................................................................40
Worksdeet 10............................................................................................................................................43
Octaie Alleiro Questonnaires..................................................................................................................46

, Executive Summary
Overview of Assessment
When the assessment took place, I interviewed Oscar Segura who works for Port of Seattle.
During our interview, the information asset we assessed was employee account information. The
assessment took place on November 7, 2018. The purpose of assessing employees’ account
information was to see what are the chances that the employee’s account information would be
compromised.

Identified Risks and Common Risk Themes
There were some area of concerns that I have discovered while the assessment was in-progress.
One of those concerns was a disgruntled employee may release an employee’s account
information. Other areas that were also a concern was a hacker may gain access to employee’s
account information in the following ways. An intruder could gain access to the access panel on
the parking garage fare kiosk and plug a hacking device such as a keyboard or a flash drive. The
Wi-Fi connection from the internal network to the parking garage fare kiosk machine could be
intercepted by an unauthorized individual. Finally, an unauthorized individual could access the
room where the locked containers are stored.
These are the different risk areas that I found within my assessment at the Port of Seattle.

Summary of Proposed Mitigation Activities
The common thing to do when you are mitigating risks is to first start with the basic assessment.
A basic assessment can be something like evaluating the systems settings that has been set by
default; such as a type of encryption, is the computer’s hard drive encryption enabled or
disabled, internet security settings configured or not, etc. these are the general things that would
need to be examined before deciding which security controls to implement to the computer
system.
The proposed mitigation methods are dependent on the area of concerns and findings that were
found during the assessment. For example, an intruder using Wi-Fi to try to obtain information
from the kiosk machine is an area of concern. So, this is the area that will be assessed and
findings that were found would be the evidence to determine which security control would be
appropriate to implement that will resolve this area of concern. Generally, you would first figure
out what basic security controls are in place and possible vulnerabilities that may occur when
evaluating computer system and its infrastructure.


Risk Assessment Report

Verknüpftes buch

Schule, Studium & Fach

Hochschule
Kurs

Dokument Information

Hochgeladen auf
11. dezember 2018
Anzahl der Seiten
47
geschrieben in
2018/2019
Typ
ABSCHLUSSARBEIT
Verantwortliche(r)
Unbekannt
Jahr
2011

Themen

8,03 €
Vollständigen Zugriff auf das Dokument erhalten:
Von 2 Studierenden gekauft

Falsches Dokument? Kostenlos tauschen Innerhalb von 14 Tagen nach dem Kauf und vor dem Herunterladen kannst du ein anderes Dokument wählen. Du kannst den Betrag einfach neu ausgeben.
Geschrieben von Student*innen, die bestanden haben
Sofort verfügbar nach Zahlung
Online lesen oder als PDF

Bewertungen von verifizierten Käufern

Alle 4 Bewertungen werden angezeigt
5 Jahr vor

5 Jahr vor

6 Jahr vor

6 Jahr vor

4,3

4 rezensionen

5
2
4
1
3
1
2
0
1
0
Zuverlässige Bewertungen auf Stuvia

Alle Bewertungen werden von echten Stuvia-Benutzern nach verifizierten Käufen abgegeben.

Lerne den Verkäufer kennen

Seller avatar
Bewertungen des Ansehens basieren auf der Anzahl der Dokumente, die ein Verkäufer gegen eine Gebühr verkauft hat, und den Bewertungen, die er für diese Dokumente erhalten hat. Es gibt drei Stufen: Bronze, Silber und Gold. Je besser das Ansehen eines Verkäufers ist, desto mehr kannst du dich auf die Qualität der Arbeiten verlassen.
titanium Central Washington University
Folgen Sie müssen sich einloggen, um Studenten oder Kursen zu folgen.
Verkauft
43
Mitglied seit
8 Jahren
Anzahl der Follower
32
Dokumente
192
Zuletzt verkauft
2 Jahren vor
IT Emporium: Accelerate Your Technical Success

My name is Joseph, I have a Master's in cybersecurity management and a Graduate Certification in Data Analytics. I also have received my Bachelor's degree in Cybersecurity as well as have obtained several IT certifications. All of the coursework assignments (undergraduate and graduate) have been uploaded to my Stuvia store. The purpose of me sharing my course assignments and study guides is to help other students get a better understanding of the IT-related subject areas that they are pursuing. All study materials I have built contain questions and answers to the courses I have taken. My university degrees are a combination of business and Information Technology. Some of the course study materials are business and administrative management related with two specializations which are cybersecurity and data analytics.

Mehr lesen Weniger lesen
4,4

12 rezensionen

5
7
4
3
3
2
2
0
1
0

Kürzlich von dir angesehen.

Warum sich Studierende für Stuvia entscheiden

on Mitstudent*innen erstellt, durch Bewertungen verifiziert

Geschrieben von Student*innen, die bestanden haben und bewertet von anderen, die diese Studiendokumente verwendet haben.

Nicht zufrieden? Wähle ein anderes Dokument

Kein Problem! Du kannst direkt ein anderes Dokument wählen, das besser zu dem passt, was du suchst.

Bezahle wie du möchtest, fange sofort an zu lernen

Kein Abonnement, keine Verpflichtungen. Bezahle wie gewohnt per Kreditkarte oder Sofort und lade dein PDF-Dokument sofort herunter.

Student with book image

“Gekauft, heruntergeladen und bestanden. So einfach kann es sein.”

Alisha Student

Häufig gestellte Fragen