SlideShare a Scribd company logo
1 of 11
Sheet1RISK
EVENTPROBABILITYIMPACTPros/ConsPROPOSED
MITIGATION PLANRISK LEVELRISK DECISIONDevice
(laptop, phone) that contains proprietary data is stolen.High
huge loss of competitive advantage, bad media exposurepro-
might help to discover hidden vulnerabilities in the employees.
Cons-employees may oppose mitigation techniquesprevent
employees from taking work laptops home. Provide locks for
the laptops.highacceptinternal network break-in from
outsidemediumdisrupt system, loss of vital datapro-will lead to
reduced external attacks once it is solved. Cons- implementation
costsuse of firewalls and other network intrusion detection
systemsmediumtransfervirus worm or trojan
infectionmediumrestoration is needed, productivity losspro-
identifies security loopholes allowing for mitigation against
them. Cons-yearly cost for antivirusinstall kaspersky antivirus
(Grachev, , & Batenin, 2013).mediumacceptsource code stolen
by external attacker or insidermediumloss of competitive
advantagecons- could lead to corporate espionageuse
authorization technique to prevent unauthorised members from
accessinglowacceptdenial of service attacksmediumproductivity
loss, system restoration might be neededpros- presence of
compensation controls will allow for the reassignment of
resources to other high risk areas. Cons-could lead to customer
lossuse of compensation controls. For example the use of
firewallsmediumtransferdata security breach for personal,
financial and/or customer datamedium-lowsome amount of bad
media exposure, loss of customers, possibility of lawsuitsCons-
underestimating this vulnerability could lead to increased
breaches and unauthorized accessuse of biometric authentication
techniqueslowavoidprolonged IT outagelowhigh disruption,
productivity loss, system restorationNAprovide secondary
power options e.g. CPUsmediumtransferpirated software, music
or movies used within Code Galorelowfines, reputation
losspros-there are less chances of unauthorized access to files in
the system. Cons-if mitigation technique fails it could be
detrimentalblocking of certain websiteslowacceptattack against
others initiated by Code Galore employeelownegative media
exposure, fines, lawsuitscons-possible destruction of
propertyintroduction of organizational behavior
policieslowacceptdata extrusion through interception of wireless
signalsmediumforbbiding policies against use of wireless media
in sending confidential and proprietary information without
authorizationpros- curb any attempts at destroying companies
integrityNAmediummitigatesabotage of source codemediumloss
of productivitypros-integrity of source code is protected. cons-
failure to address this issue could lead to competitor gaining
access to the source code leading to loss of competitive
advantage (Flynn, Clark, Moore, , Collins, Tsamitis, Mundie, &
McIntire, 2013).use authorization only for top notch members
of the organizationmediummitigateFlynn, L., Clark, J., Moore,
A. P., Collins, M., Tsamitis, E., Mundie, D., & McIntire, D.
(2013, October). Four insider IT sabotage mitigation patterns
and an initial effectiveness analysis. In Proceedings of the 20th
Conference on Pattern Languages of Programs (pp. 1-19).
Grachev, V. V., & Batenin, V. A. (2013). U.S. Patent No.
8,424,093. Washington, DC: U.S. Patent and Trademark Office.
Running Head: RESPONSES
1
RESPONSES 3
Responses
Student Name
Institution
Date
1.
Today we are in a position to see what the self-referentially
incoherent statement is as Interpreted by the recipient of this
book, maybe to see some of the consequences of
postcolonialism the reader should have the textual analysis of
colonialism itself. In this novel, the Poor Christ of Bomba, the
writer, Mongo Beti uses narrative to tell the tale that makes the
audience inside the thought of the fourteen year old who finds
himself in a situation beyond his control. The portrayal of these
narrate personify the era that draws the line between purity and
consciousness. This status as it were in this novel takes a
satirical approach on how the conditions under colonialism law
may have been. Betis clever move on languages, places, and
storylines open up the idea of the audience to bring in some of
the implications dimension to exploitation that create the period
postcolonialism so arbitrary.
2.
Published at this 3rd person but from the character’s viewpoint,
Ambiguous Adventure traces the training of Samba Diallo from
the conventional Muslim practice of retelling the Quran in
Senegal to advanced studies of philosophy in Paris. Difficult in
French or English, this book consists mainly of discussion in
which different characters adopt and discuss distinctive
ideological beliefs. Rather than simply remembering the
chronology of the autobiographical journey into West college
education, Cheikh Hamidou Kane immerses the audience at the
difficult dilemma of Senegalese aristocrats, who must determine
how to accept their own Muslim religion with the materialism of
contemporary Europe. As Samba pursues his adventure at
thoughts, he grows increasingly estranged from the worldviews
of both the region and French West Africa, therefore growing
difficult topics for French assimilationist terms in the wake of
colonial conquest.
3
As we will say, these final words of the Ambiguous Adventure
keenly express the point of the disagreement amongst this
Diallobe’s spiritualism in addition the region’s desire that was
in the origin of the rupture of the Samba Diallo’s being. Is not
that one sort of success of the rule of religion at the order of the
materialistic society? Henceforward, the role of Salif Bâ, in the
second book the steward of the building, could be, in a way,
The incarnation of the Samba Diallo who was as well able to
accept the Diallobé’s passionate religion besides the rationalist
attitude of the contemporary region. If I chose to take this
opposition between society as well as religion as the primary
topic of the Ambiguous Adventure, then it is because this fight
of the Muslim Africa with the contemporary region was the
collapse of two cultures giving two opposing views of the
world: On the one side the society of faith turned in the
direction of darkness, Ruled through spirituality plus religion,
and in contrast the rationalist society, with triumphant desire,
Whose primary purpose is to get those who carry it “ masters of
the surface ” at the risk of going slowly underneath the weight
of information.
Sheet1RISK
EVENTPROBABILITYIMPACTPros/ConsPROPOSED
MITIGATION PLANRISK LEVELRISK DECISIONDevice
(laptop, phone) that contains proprietary data is stolen.High
huge loss of competitive advantage, bad media exposurepro-
might help to discover hidden vulnerabilities in the employees.
Cons-employees may oppose mitigation techniquesprevent
employees from taking work laptops home. Provide locks for
the laptops.highacceptinternal network break-in from
outsidemediumdisrupt system, loss of vital datapro-will lead to
reduced external attacks once it is solved. Cons- implementation
costsuse of firewalls and other network intrusion detection
systemsmediumtransfervirus worm or trojan
infectionmediumrestoration is needed, productivity losspro-
identifies security loopholes allowing for mitigation against
them. Cons-yearly cost for antivirusinstall kaspersky antivirus
(Grachev, , & Batenin, 2013).mediumacceptsource code stolen
by external attacker or insidermediumloss of competitive
advantagecons- could lead to corporate espionageuse
authorization technique to prevent unauthorised members from
accessinglowacceptdenial of service attacksmediumproductivity
loss, system restoration might be neededpros- presence of
compensation controls will allow for the reassignment of
resources to other high risk areas. Cons-could lead to customer
lossuse of compensation controls. For example the use of
firewallsmediumtransferdata security breach for personal,
financial and/or customer datamedium-lowsome amount of bad
media exposure, loss of customers, possibility of lawsuitsCons -
underestimating this vulnerability could lead to increased
breaches and unauthorized accessuse of biometric authentication
techniqueslowavoidprolonged IT outagelowhigh disruption,
productivity loss, system restorationNAprovide secondary
power options e.g. CPUsmediumtransferpirated software, music
or movies used within Code Galorelowfines, reputation
losspros-there are less chances of unauthorized access to files in
the system. Cons-if mitigation technique fails it could be
detrimentalblocking of certain websiteslowacceptattack against
others initiated by Code Galore employeelownegative media
exposure, fines, lawsuitscons-possible destruction of
propertyintroduction of organizational behavior
policieslowacceptdata extrusion through interception of wireless
signalsmediumforbbiding policies against use of wireless media
in sending confidential and proprietary information without
authorizationpros- curb any attempts at destroying companies
integrityNAmediummitigatesabotage of source codemediumloss
of productivitypros-integrity of source code is protected. cons-
failure to address this issue could lead to competitor gaining
access to the source code leading to loss of competitive
advantage (Flynn, Clark, Moore, , Collins, Tsamitis, Mundie, &
McIntire, 2013).use authorization only for top notch members
of the organizationmediummitigateFlynn, L., Clark, J., Moore,
A. P., Collins, M., Tsamitis, E., Mundie, D., & McIntire, D.
(2013, October). Four insider IT sabotage mitigation patterns
and an initial effectiveness analysis. In Proceedings of the 20th
Conference on Pattern Languages of Programs (pp. 1-19).
Grachev, V. V., & Batenin, V. A. (2013). U.S. Patent No.
8,424,093. Washington, DC: U.S. Patent and Trademark Office.
Cisco 892 ISR
Cisco Catalyst 2960S-48LPS-L - Switch
Windows Server 2008 R2
Exchange 2010
Red Hat Enterprise
Apache, PHP, MySQL
JBOSS
Windows Server 2008 R2
Primary Domain Controller and File Share
48 Desktop Computers
Windows 7 Ent
83 Laptop Computers
Windows 7 Ent
8 Tablets, Android OS 17 Smart Phones
Android OS
192.168.0.3
192.168.0.5
192.168.0.4
192.168.0.200-248
192.168.0.100-183
192.168.0.50-58
192.168.0.75-92
192.168.0.1
192.168.0.2
Part 2 – Directions – For this assignment, refer back to your last
week’s assignment. Take the above network diagram and
identify all single points of failure. Once
you find one, describe why it is a SPOF and offer two or three
solutions to compensate for this SPOF . In the last section, take
one solution from each SPOF and
research the cost for implementation.
P -$9423.00
V -$242,000.00
P -$7453.00
V -$49,000.00
P -$14,785.00
V -$132,000.00
P -$924.00
P -$2754.00
P - $1425.00 Each
P -$1274.00 Each
P -$399.00 Each
P -$199.00 Each
W06A1.vsdPage-1
Cisco 892 ISR
Cisco Catalyst 2960S-48LPS-L - Switch
Windows Server 2008 R2
Exchange 2010
Red Hat Enterprise
Apache, PHP, MySQL
JBOSS
Windows Server 2008 R2
Primary Domain Controller and File Share
48 Desktop Computers
Windows 7 Ent
83 Laptop Computers
Windows 7 Ent
8 Tablets, Android OS 17 Smart Phones
Android OS
192.168.0.3
192.168.0.5
192.168.0.4
192.168.0.200-248
192.168.0.100-183
192.168.0.50-58
192.168.0.75-92
192.168.0.1
192.168.0.2
Part 1 Directions – For this assignment, evaluate the above
network diagram for a basic small marketing firm in San
Francisco, CA. You have been asked to write-up
a basic risk assessment for this company. In the first part,
brainstorm and list every risk you can imagine (realistic for this
company) include virtual, physical and
“stupid” in your listing. Provide a brief one-to-two sentence
overview for each risk you list. In the second section, pick the
top risk and create a Quantitative RA (last
week) for a single loss expectancy. Each event will have it’s
own price tag and amount of downtime. The values for each
device is listed as “P” for physical cost and
“V” for the estimated value of the data on each device. Each
day the network is down results in a loss of $86,000.00.
P -$9423.00
V -$242,000.00
P -$7453.00
V -$49,000.00
P -$14,785.00
V -$132,000.00
P -$924.00
P -$2754.00
P - $1425.00 Each
P -$1274.00 Each
P -$399.00 Each
P -$199.00 Each
W05A1.vsdPage-1

More Related Content

Similar to Sheet1RISK EVENTPROBABILITYIMPACTProsConsPROPOSED MITIGATION PLAN

A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
Symantec
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
Austin Eppstein
 
Analytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’sAnalytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’s
ijtsrd
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
 
Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...
Hari Rajagopalan
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
Stuart Clarke
 

Similar to Sheet1RISK EVENTPROBABILITYIMPACTProsConsPROPOSED MITIGATION PLAN (20)

Information security
Information securityInformation security
Information security
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Ivp soc driven-vulnerability_02_2014_eng
Ivp soc driven-vulnerability_02_2014_engIvp soc driven-vulnerability_02_2014_eng
Ivp soc driven-vulnerability_02_2014_eng
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Analytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’sAnalytical Study on Network Security Breach’s
Analytical Study on Network Security Breach’s
 
C018131821
C018131821C018131821
C018131821
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
Cyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threatCyber Security Conference - Rethinking cyber-threat
Cyber Security Conference - Rethinking cyber-threat
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...Application of complex adaptive systems to pricing of reproducible informatio...
Application of complex adaptive systems to pricing of reproducible informatio...
 
Bo e v1.0
Bo e v1.0Bo e v1.0
Bo e v1.0
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
 

More from WilheminaRossi174

Senior Seminar in Business Administration BUS 499Coope.docx
Senior Seminar in Business Administration BUS 499Coope.docxSenior Seminar in Business Administration BUS 499Coope.docx
Senior Seminar in Business Administration BUS 499Coope.docx
WilheminaRossi174
 
Serial KillersFor this assignment you will review a serial kille.docx
Serial KillersFor this assignment you will review a serial kille.docxSerial KillersFor this assignment you will review a serial kille.docx
Serial KillersFor this assignment you will review a serial kille.docx
WilheminaRossi174
 
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docxSESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
WilheminaRossi174
 
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docxSheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
WilheminaRossi174
 
Selecting & Implementing Interventions – Assignment #4.docx
Selecting & Implementing Interventions – Assignment #4.docxSelecting & Implementing Interventions – Assignment #4.docx
Selecting & Implementing Interventions – Assignment #4.docx
WilheminaRossi174
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxSeediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docx
WilheminaRossi174
 
Shared Reading FrameworkFollow this framework when viewing the v.docx
Shared Reading FrameworkFollow this framework when viewing the v.docxShared Reading FrameworkFollow this framework when viewing the v.docx
Shared Reading FrameworkFollow this framework when viewing the v.docx
WilheminaRossi174
 
Self-disclosureDepth of reflectionResponse demonstrates an in.docx
Self-disclosureDepth of reflectionResponse demonstrates an in.docxSelf-disclosureDepth of reflectionResponse demonstrates an in.docx
Self-disclosureDepth of reflectionResponse demonstrates an in.docx
WilheminaRossi174
 
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docxSheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
WilheminaRossi174
 
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docxSeemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
WilheminaRossi174
 
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docxSHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
WilheminaRossi174
 
See discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docxSee discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docx
WilheminaRossi174
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxSegmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docx
WilheminaRossi174
 
School of Community and Environmental HealthMPH Program .docx
School of Community and Environmental HealthMPH Program .docxSchool of Community and Environmental HealthMPH Program .docx
School of Community and Environmental HealthMPH Program .docx
WilheminaRossi174
 
School Effects on Psychological Outcomes During Adolescence.docx
School Effects on Psychological Outcomes During Adolescence.docxSchool Effects on Psychological Outcomes During Adolescence.docx
School Effects on Psychological Outcomes During Adolescence.docx
WilheminaRossi174
 

More from WilheminaRossi174 (20)

Senior Seminar in Business Administration BUS 499Coope.docx
Senior Seminar in Business Administration BUS 499Coope.docxSenior Seminar in Business Administration BUS 499Coope.docx
Senior Seminar in Business Administration BUS 499Coope.docx
 
Select two countries that have been or currently are in confli.docx
Select two countries that have been or currently are in confli.docxSelect two countries that have been or currently are in confli.docx
Select two countries that have been or currently are in confli.docx
 
Serial KillersFor this assignment you will review a serial kille.docx
Serial KillersFor this assignment you will review a serial kille.docxSerial KillersFor this assignment you will review a serial kille.docx
Serial KillersFor this assignment you will review a serial kille.docx
 
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docxSESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
 
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docxSheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
 
Selecting & Implementing Interventions – Assignment #4.docx
Selecting & Implementing Interventions – Assignment #4.docxSelecting & Implementing Interventions – Assignment #4.docx
Selecting & Implementing Interventions – Assignment #4.docx
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxSeediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docx
 
Shared Reading FrameworkFollow this framework when viewing the v.docx
Shared Reading FrameworkFollow this framework when viewing the v.docxShared Reading FrameworkFollow this framework when viewing the v.docx
Shared Reading FrameworkFollow this framework when viewing the v.docx
 
Self-disclosureDepth of reflectionResponse demonstrates an in.docx
Self-disclosureDepth of reflectionResponse demonstrates an in.docxSelf-disclosureDepth of reflectionResponse demonstrates an in.docx
Self-disclosureDepth of reflectionResponse demonstrates an in.docx
 
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docxSheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
 
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docxSeemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
 
See the attachment of 1 Article belowPlease answer all the que.docx
See the attachment of 1 Article belowPlease answer all the que.docxSee the attachment of 1 Article belowPlease answer all the que.docx
See the attachment of 1 Article belowPlease answer all the que.docx
 
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docxSHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
 
Select a healthcare legislature of interest. Discuss the historica.docx
Select a healthcare legislature of interest. Discuss the historica.docxSelect a healthcare legislature of interest. Discuss the historica.docx
Select a healthcare legislature of interest. Discuss the historica.docx
 
See discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docxSee discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docx
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxSegmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docx
 
Select a local, state, or national public policy that is relev.docx
Select a local, state, or national public policy that is relev.docxSelect a local, state, or national public policy that is relev.docx
Select a local, state, or national public policy that is relev.docx
 
School of Community and Environmental HealthMPH Program .docx
School of Community and Environmental HealthMPH Program .docxSchool of Community and Environmental HealthMPH Program .docx
School of Community and Environmental HealthMPH Program .docx
 
School Effects on Psychological Outcomes During Adolescence.docx
School Effects on Psychological Outcomes During Adolescence.docxSchool Effects on Psychological Outcomes During Adolescence.docx
School Effects on Psychological Outcomes During Adolescence.docx
 
Search the gene belonging to the accession id you selected in week 2.docx
Search the gene belonging to the accession id you selected in week 2.docxSearch the gene belonging to the accession id you selected in week 2.docx
Search the gene belonging to the accession id you selected in week 2.docx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Sheet1RISK EVENTPROBABILITYIMPACTProsConsPROPOSED MITIGATION PLAN

  • 1. Sheet1RISK EVENTPROBABILITYIMPACTPros/ConsPROPOSED MITIGATION PLANRISK LEVELRISK DECISIONDevice (laptop, phone) that contains proprietary data is stolen.High huge loss of competitive advantage, bad media exposurepro- might help to discover hidden vulnerabilities in the employees. Cons-employees may oppose mitigation techniquesprevent employees from taking work laptops home. Provide locks for the laptops.highacceptinternal network break-in from outsidemediumdisrupt system, loss of vital datapro-will lead to reduced external attacks once it is solved. Cons- implementation costsuse of firewalls and other network intrusion detection systemsmediumtransfervirus worm or trojan infectionmediumrestoration is needed, productivity losspro- identifies security loopholes allowing for mitigation against them. Cons-yearly cost for antivirusinstall kaspersky antivirus (Grachev, , & Batenin, 2013).mediumacceptsource code stolen by external attacker or insidermediumloss of competitive advantagecons- could lead to corporate espionageuse authorization technique to prevent unauthorised members from accessinglowacceptdenial of service attacksmediumproductivity loss, system restoration might be neededpros- presence of compensation controls will allow for the reassignment of resources to other high risk areas. Cons-could lead to customer lossuse of compensation controls. For example the use of firewallsmediumtransferdata security breach for personal, financial and/or customer datamedium-lowsome amount of bad media exposure, loss of customers, possibility of lawsuitsCons- underestimating this vulnerability could lead to increased breaches and unauthorized accessuse of biometric authentication techniqueslowavoidprolonged IT outagelowhigh disruption, productivity loss, system restorationNAprovide secondary power options e.g. CPUsmediumtransferpirated software, music or movies used within Code Galorelowfines, reputation
  • 2. losspros-there are less chances of unauthorized access to files in the system. Cons-if mitigation technique fails it could be detrimentalblocking of certain websiteslowacceptattack against others initiated by Code Galore employeelownegative media exposure, fines, lawsuitscons-possible destruction of propertyintroduction of organizational behavior policieslowacceptdata extrusion through interception of wireless signalsmediumforbbiding policies against use of wireless media in sending confidential and proprietary information without authorizationpros- curb any attempts at destroying companies integrityNAmediummitigatesabotage of source codemediumloss of productivitypros-integrity of source code is protected. cons- failure to address this issue could lead to competitor gaining access to the source code leading to loss of competitive advantage (Flynn, Clark, Moore, , Collins, Tsamitis, Mundie, & McIntire, 2013).use authorization only for top notch members of the organizationmediummitigateFlynn, L., Clark, J., Moore, A. P., Collins, M., Tsamitis, E., Mundie, D., & McIntire, D. (2013, October). Four insider IT sabotage mitigation patterns and an initial effectiveness analysis. In Proceedings of the 20th Conference on Pattern Languages of Programs (pp. 1-19). Grachev, V. V., & Batenin, V. A. (2013). U.S. Patent No. 8,424,093. Washington, DC: U.S. Patent and Trademark Office. Running Head: RESPONSES 1 RESPONSES 3
  • 3. Responses Student Name Institution Date 1. Today we are in a position to see what the self-referentially incoherent statement is as Interpreted by the recipient of this book, maybe to see some of the consequences of postcolonialism the reader should have the textual analysis of colonialism itself. In this novel, the Poor Christ of Bomba, the writer, Mongo Beti uses narrative to tell the tale that makes the audience inside the thought of the fourteen year old who finds himself in a situation beyond his control. The portrayal of these narrate personify the era that draws the line between purity and consciousness. This status as it were in this novel takes a satirical approach on how the conditions under colonialism law may have been. Betis clever move on languages, places, and storylines open up the idea of the audience to bring in some of the implications dimension to exploitation that create the period postcolonialism so arbitrary. 2. Published at this 3rd person but from the character’s viewpoint, Ambiguous Adventure traces the training of Samba Diallo from
  • 4. the conventional Muslim practice of retelling the Quran in Senegal to advanced studies of philosophy in Paris. Difficult in French or English, this book consists mainly of discussion in which different characters adopt and discuss distinctive ideological beliefs. Rather than simply remembering the chronology of the autobiographical journey into West college education, Cheikh Hamidou Kane immerses the audience at the difficult dilemma of Senegalese aristocrats, who must determine how to accept their own Muslim religion with the materialism of contemporary Europe. As Samba pursues his adventure at thoughts, he grows increasingly estranged from the worldviews of both the region and French West Africa, therefore growing difficult topics for French assimilationist terms in the wake of colonial conquest. 3 As we will say, these final words of the Ambiguous Adventure keenly express the point of the disagreement amongst this Diallobe’s spiritualism in addition the region’s desire that was in the origin of the rupture of the Samba Diallo’s being. Is not that one sort of success of the rule of religion at the order of the materialistic society? Henceforward, the role of Salif Bâ, in the second book the steward of the building, could be, in a way, The incarnation of the Samba Diallo who was as well able to accept the Diallobé’s passionate religion besides the rationalist attitude of the contemporary region. If I chose to take this opposition between society as well as religion as the primary topic of the Ambiguous Adventure, then it is because this fight of the Muslim Africa with the contemporary region was the collapse of two cultures giving two opposing views of the world: On the one side the society of faith turned in the direction of darkness, Ruled through spirituality plus religion, and in contrast the rationalist society, with triumphant desire, Whose primary purpose is to get those who carry it “ masters of the surface ” at the risk of going slowly underneath the weight of information.
  • 5. Sheet1RISK EVENTPROBABILITYIMPACTPros/ConsPROPOSED MITIGATION PLANRISK LEVELRISK DECISIONDevice (laptop, phone) that contains proprietary data is stolen.High huge loss of competitive advantage, bad media exposurepro- might help to discover hidden vulnerabilities in the employees. Cons-employees may oppose mitigation techniquesprevent
  • 6. employees from taking work laptops home. Provide locks for the laptops.highacceptinternal network break-in from outsidemediumdisrupt system, loss of vital datapro-will lead to reduced external attacks once it is solved. Cons- implementation costsuse of firewalls and other network intrusion detection systemsmediumtransfervirus worm or trojan infectionmediumrestoration is needed, productivity losspro- identifies security loopholes allowing for mitigation against them. Cons-yearly cost for antivirusinstall kaspersky antivirus (Grachev, , & Batenin, 2013).mediumacceptsource code stolen by external attacker or insidermediumloss of competitive advantagecons- could lead to corporate espionageuse authorization technique to prevent unauthorised members from accessinglowacceptdenial of service attacksmediumproductivity loss, system restoration might be neededpros- presence of compensation controls will allow for the reassignment of resources to other high risk areas. Cons-could lead to customer lossuse of compensation controls. For example the use of firewallsmediumtransferdata security breach for personal, financial and/or customer datamedium-lowsome amount of bad media exposure, loss of customers, possibility of lawsuitsCons - underestimating this vulnerability could lead to increased breaches and unauthorized accessuse of biometric authentication techniqueslowavoidprolonged IT outagelowhigh disruption, productivity loss, system restorationNAprovide secondary power options e.g. CPUsmediumtransferpirated software, music or movies used within Code Galorelowfines, reputation losspros-there are less chances of unauthorized access to files in the system. Cons-if mitigation technique fails it could be detrimentalblocking of certain websiteslowacceptattack against others initiated by Code Galore employeelownegative media exposure, fines, lawsuitscons-possible destruction of propertyintroduction of organizational behavior policieslowacceptdata extrusion through interception of wireless signalsmediumforbbiding policies against use of wireless media in sending confidential and proprietary information without
  • 7. authorizationpros- curb any attempts at destroying companies integrityNAmediummitigatesabotage of source codemediumloss of productivitypros-integrity of source code is protected. cons- failure to address this issue could lead to competitor gaining access to the source code leading to loss of competitive advantage (Flynn, Clark, Moore, , Collins, Tsamitis, Mundie, & McIntire, 2013).use authorization only for top notch members of the organizationmediummitigateFlynn, L., Clark, J., Moore, A. P., Collins, M., Tsamitis, E., Mundie, D., & McIntire, D. (2013, October). Four insider IT sabotage mitigation patterns and an initial effectiveness analysis. In Proceedings of the 20th Conference on Pattern Languages of Programs (pp. 1-19). Grachev, V. V., & Batenin, V. A. (2013). U.S. Patent No. 8,424,093. Washington, DC: U.S. Patent and Trademark Office. Cisco 892 ISR Cisco Catalyst 2960S-48LPS-L - Switch Windows Server 2008 R2 Exchange 2010 Red Hat Enterprise Apache, PHP, MySQL JBOSS Windows Server 2008 R2 Primary Domain Controller and File Share 48 Desktop Computers Windows 7 Ent
  • 8. 83 Laptop Computers Windows 7 Ent 8 Tablets, Android OS 17 Smart Phones Android OS 192.168.0.3 192.168.0.5 192.168.0.4 192.168.0.200-248 192.168.0.100-183 192.168.0.50-58 192.168.0.75-92 192.168.0.1 192.168.0.2 Part 2 – Directions – For this assignment, refer back to your last week’s assignment. Take the above network diagram and identify all single points of failure. Once you find one, describe why it is a SPOF and offer two or three solutions to compensate for this SPOF . In the last section, take one solution from each SPOF and research the cost for implementation. P -$9423.00 V -$242,000.00 P -$7453.00 V -$49,000.00
  • 9. P -$14,785.00 V -$132,000.00 P -$924.00 P -$2754.00 P - $1425.00 Each P -$1274.00 Each P -$399.00 Each P -$199.00 Each W06A1.vsdPage-1 Cisco 892 ISR Cisco Catalyst 2960S-48LPS-L - Switch Windows Server 2008 R2 Exchange 2010 Red Hat Enterprise Apache, PHP, MySQL JBOSS Windows Server 2008 R2 Primary Domain Controller and File Share 48 Desktop Computers Windows 7 Ent 83 Laptop Computers Windows 7 Ent
  • 10. 8 Tablets, Android OS 17 Smart Phones Android OS 192.168.0.3 192.168.0.5 192.168.0.4 192.168.0.200-248 192.168.0.100-183 192.168.0.50-58 192.168.0.75-92 192.168.0.1 192.168.0.2 Part 1 Directions – For this assignment, evaluate the above network diagram for a basic small marketing firm in San Francisco, CA. You have been asked to write-up a basic risk assessment for this company. In the first part, brainstorm and list every risk you can imagine (realistic for this company) include virtual, physical and “stupid” in your listing. Provide a brief one-to-two sentence overview for each risk you list. In the second section, pick the top risk and create a Quantitative RA (last week) for a single loss expectancy. Each event will have it’s own price tag and amount of downtime. The values for each device is listed as “P” for physical cost and “V” for the estimated value of the data on each device. Each day the network is down results in a loss of $86,000.00. P -$9423.00
  • 11. V -$242,000.00 P -$7453.00 V -$49,000.00 P -$14,785.00 V -$132,000.00 P -$924.00 P -$2754.00 P - $1425.00 Each P -$1274.00 Each P -$399.00 Each P -$199.00 Each W05A1.vsdPage-1