SlideShare a Scribd company logo
1 of 14
Threat Mitigation Worksheet
Form # TM01
Page ____ of _____
Business Name:
Address:
Facility # 001
Contact:
Phone number:
E-mail:
Asset
Threat
Mitigation Techniques
Threat Identification and Assessment Worksheet
Form # TIDA01
Page ____ of _____
Business Name:
Address:
Facility # 001
Contact:
Phone number:
E-mail:
Threat
POC
Assets Affected
Consequence (C, S, M, I)
Severity (C, S, M, I)
Asset Identification Worksheet
Form # AID01
Page ____ of _____
Business Name:
Address:
Facility # 001
Contact:
Phone Number:
E-mail:
Asset
Quantity
Department or Location
Value
Priority
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
Business Process Identification Worksheet
Form # BPID01
Page ____ of _____
Business Name:
Address:
Facility # 001
Contact:
Phone number:
E-mail:
Business Process
Priority
Department
Assets Used
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
Risk Assessment documentation templates are located within
this section. Make additional copies as needed. In a real risk
analysis process, one of the first steps is meeting with all
department managers, upper management, employee
representatives, and workers in the production environment,
human resources staff, and other staff members to get their
input. Without input from the people actually doing the work,
you might not think of essential factors. That isn't possible
here, so direct any questions you have to the instructor, or do
independent research to find your answers.
· First, identify the business processes that must continue for
the organization to keep functioning—for example, collecting
money from customers, receiving and processing sales,
developing new products, and so on. Document major business
processes that drive SunGrafix, using the Business Process
column of the Business Process Identification Worksheet. (You
need your imagination and some common sense for this step.)
Assign a priority level to each process (using the priority
rankings in the following list). Write down the department that
performs the process, and leave the Assets Used column blank
for now. Next, identify the organization's assets. Using the
Asset Identification Worksheet that is provided in the Course
Documents section on Blackboard, list each asset, its location,
and approximate value, if known. (For multiple identical assets,
describe the asset and list the quantity instead of listing each
individual asset.) In organization-wide risk assessments, you
would list all assets, including office furniture, industrial
equipment, personnel, and other assets. For this project, stick to
information technology assets, such as computers, servers, and
networking equipment, etc. The information you enter depends
on the network design you completed earlier. All the equipment
needed to build your network should be listed here as well as
any cabling in the facility. (Assume the facility is already wired
for a computer network with network drops available for each
computer.) Hint: Remember to list items such as electricity and
your Internet connection.Next, determine which assets support
each business process. On your Business Process Identification
Worksheet, list the assets needed for each business process in
the Assets Used column.
· Critical — Absolutely necessary for business operations to
continue. Loss of a critical process halts business activities.
· Necessary — Contributes to smooth, efficient operations. Loss
of a necessary process doesn't halt business operations but
degrades working conditions, slows production, or contributes
to errors.
· Desirable — Contributes to enhanced performance and
productivity and helps create a more comfortable working
environment, but loss of a desirable process doesn't halt or
negatively affect operations.
· Next, determine which assets support each business process.
On your Business Process Identification Worksheet, list the
assets needed for each business process in the Assets Used
column.
· Each process should be documented and have a priority
assigned to it. Next, transfer the priority rankings to your Asset
Identification Worksheet. Now you know which assets are the
most critical to restore and warrant the most expense and effort
to secure. You also have the documentation to back up your
security actions for each item.
· The final step is assessing existing threats. The table below
shows examples of ways to evaluate some types of threats and
suggests ways to quantify them. On the Threat Identification
and Assessment Worksheet, list each possible threat. Be sure to
consider threats from geographic and physical factors,
personnel, malicious attack or sabotage, and accidents. Also,
examine the facility diagram you created for flaws in the
facility layout or structure that could pose a threat, such as air-
conditioning failure or loss of electrical service. Assess the
probability of occurrence (POC) on a 1 to 10 scale, with 1 being
the lowest and 10 the highest, and assign those ratings in the
POC column for each threat.
Type of Threat
How to Quantify
Severe rainstorm, tornado, hurricane, earthquake, wilderness
fire, or flood
Collect data on frequency, severity, and proximity to facilities.
Evaluate the past quality and speed of local and regional
emergency response systems to determine whether they helped
minimize loss.
Train derailment, auto/ truck accident, toxic air pollution
caused by accident, or plane crash
Collect data on the proximity of railroads, highways, and
airports to facilities. Evaluate the construction quality of
transportation systems and the rate of serious accidents on each
system.
Building explosion or fire
Collect data on the frequency and severity of past incidents.
Evaluate local emergency response to determine its
effectiveness.
Militant group attacking facilities, riot, or civil unrest
Collect data on the political stability of the region where
facilities are located. Compile and evaluate a list of groups that
might have specific political or social issues with the
Organization.
Computer hack (external) or computer fraud (internal)
Examine data on the frequency and severity of past incidents.
Evaluate the effectiveness of existing computer security
measures.
· Next, using the Asset Identification Worksheet, determine
which assets would be affected by each threat. List those assets
in the Assets Affected column of the Threat Identification and
Assessment Worksheet. For an electrical outage, for example,
list all assets requiring electricity to operate; for a hardware
failure, list all assets a hardware failure would disrupt, damage,
or destroy
· In the Consequence column, enter the consequences of the
threat occurring, using the following designations: Next, rate
the severity of each threat in the Severity column, using the
same designations as in the preceding list for consequences (C,
S, M, or I). You derive these ratings by combining the
probability of occurrence, the asset's priority ranking, and the
potential consequences of a threat occurring. For example, if an
asset has a Critical (C) priority ranking and a Catastrophic (C)
consequence rating, it has a Catastrophic (C) severity rating. If
you have mixed or contradictory ratings, you need to re-
evaluate the asset and use common sense. A terrorist attack that
destroys the facility and kills half the staff might have a
probability of occurrence (POC) of only 1 (depending on your
location), but if it happened, the consequences would definitely
be catastrophic. Even so, because of the low POC, you wouldn't
necessarily rank its severity as catastrophic.
· Catastrophic (C)—Total loss of business processes or
functions for one week or more. Potential complete failure of
business.
· Severe (S)—Business would be unable to continue functioning
for 24 to 48 hours. Losses of revenue, damage to reputation or
confidence, reduction of productivity, complete loss of critical
data or systems.
· Moderate (M)—Business could continue after an interruption
of no more than 4 hours. Some loss of productivity and damage
or destruction of important information or systems.
· Insignificant (I)—Business could continue functioning without
interruption. Some cost incurred for repairs or recovery. Minor
equipment or facility damage. Minor productivity loss and little
or no loss of important data.
· Finally, on the Threat Mitigation Worksheet, list assets that
are ranked as the most critical and threatened with the highest
severity. In the Mitigation Techniques column, list
recommendations for mitigating threats to those assets. For
example, to mitigate the threat of an electrical outage damaging
a critical server, you might suggest a high-end uninterruptible
power supply (UPS).
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx

More Related Content

Similar to Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx

Task 4 Computer Incident Response Team Plan – · Loss of company.docx
Task 4 Computer Incident Response Team Plan – · Loss of company.docxTask 4 Computer Incident Response Team Plan – · Loss of company.docx
Task 4 Computer Incident Response Team Plan – · Loss of company.docx
bradburgess22840
 
Key AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docxKey AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docx
sleeperfindley
 
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxDisaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
duketjoy27252
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
Chad Korosec
 
(White House IT Security Staff BCP Policy) ([CSIA 4.docx
 (White House IT Security Staff BCP Policy) ([CSIA 4.docx (White House IT Security Staff BCP Policy) ([CSIA 4.docx
(White House IT Security Staff BCP Policy) ([CSIA 4.docx
joyjonna282
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Hernan Huwyler, MBA CPA
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
tienboileau
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2
Mike Revell
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
SlideTeam
 
Cybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation SlidesCybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation Slides
SlideTeam
 

Similar to Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx (20)

Task 4 Computer Incident Response Team Plan – · Loss of company.docx
Task 4 Computer Incident Response Team Plan – · Loss of company.docxTask 4 Computer Incident Response Team Plan – · Loss of company.docx
Task 4 Computer Incident Response Team Plan – · Loss of company.docx
 
Top 5 Steps to Disaster Preparedness for Businesses
Top 5 Steps to Disaster Preparedness for BusinessesTop 5 Steps to Disaster Preparedness for Businesses
Top 5 Steps to Disaster Preparedness for Businesses
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Key AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docxKey AssignmentThe management team as well as your peers are happy .docx
Key AssignmentThe management team as well as your peers are happy .docx
 
Business Continuity Workshop Final
Business Continuity Workshop   FinalBusiness Continuity Workshop   Final
Business Continuity Workshop Final
 
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxDisaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 
Dit yvol4iss50
Dit yvol4iss50Dit yvol4iss50
Dit yvol4iss50
 
(White House IT Security Staff BCP Policy) ([CSIA 4.docx
 (White House IT Security Staff BCP Policy) ([CSIA 4.docx (White House IT Security Staff BCP Policy) ([CSIA 4.docx
(White House IT Security Staff BCP Policy) ([CSIA 4.docx
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
 
Incident Consequence Analysis
Incident Consequence AnalysisIncident Consequence Analysis
Incident Consequence Analysis
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2a-guide-to-ddos-2015-2
a-guide-to-ddos-2015-2
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
 
Prevention Protection And Mitigation Planning PowerPoint Presentation Slides
Prevention Protection And Mitigation Planning PowerPoint Presentation SlidesPrevention Protection And Mitigation Planning PowerPoint Presentation Slides
Prevention Protection And Mitigation Planning PowerPoint Presentation Slides
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docx
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
Cybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation SlidesCybersecurity Incident Management PowerPoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation Slides
 
Cards Performance Testing (Whitepaper)
Cards Performance Testing (Whitepaper)Cards Performance Testing (Whitepaper)
Cards Performance Testing (Whitepaper)
 

More from herthalearmont

TNEEL-NE Theoretical Perspectives Learning Activ.docx
TNEEL-NE Theoretical Perspectives   Learning Activ.docxTNEEL-NE Theoretical Perspectives   Learning Activ.docx
TNEEL-NE Theoretical Perspectives Learning Activ.docx
herthalearmont
 
To Board of Directors of Reed Elsevier Plc.From Report.docx
To       Board of Directors of Reed Elsevier Plc.From   Report.docxTo       Board of Directors of Reed Elsevier Plc.From   Report.docx
To Board of Directors of Reed Elsevier Plc.From Report.docx
herthalearmont
 
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docxTMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
herthalearmont
 
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docxTitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
herthalearmont
 
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docxTitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
herthalearmont
 
TitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docxTitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docx
herthalearmont
 
TitleABC123 Version X1Weekly Overview Week FourHCS.docx
TitleABC123 Version X1Weekly Overview Week FourHCS.docxTitleABC123 Version X1Weekly Overview Week FourHCS.docx
TitleABC123 Version X1Weekly Overview Week FourHCS.docx
herthalearmont
 
TitleABC123 Version X1Week One Assignment Worksheet.docx
TitleABC123 Version X1Week One Assignment Worksheet.docxTitleABC123 Version X1Week One Assignment Worksheet.docx
TitleABC123 Version X1Week One Assignment Worksheet.docx
herthalearmont
 
TitleABC123 Version X1Week 4 Practice Worksheet.docx
TitleABC123 Version X1Week 4 Practice Worksheet.docxTitleABC123 Version X1Week 4 Practice Worksheet.docx
TitleABC123 Version X1Week 4 Practice Worksheet.docx
herthalearmont
 
TitleABC123 Version X1Workplace Safety Plan Worksheet.docx
TitleABC123 Version X1Workplace Safety Plan Worksheet.docxTitleABC123 Version X1Workplace Safety Plan Worksheet.docx
TitleABC123 Version X1Workplace Safety Plan Worksheet.docx
herthalearmont
 
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docxTitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
herthalearmont
 
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docxTMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
herthalearmont
 
TL3127 Creativity & Innovation in Organisations – 201718Assig.docx
TL3127 Creativity & Innovation in Organisations – 201718Assig.docxTL3127 Creativity & Innovation in Organisations – 201718Assig.docx
TL3127 Creativity & Innovation in Organisations – 201718Assig.docx
herthalearmont
 
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docxTitle The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
herthalearmont
 
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docxTitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
herthalearmont
 

More from herthalearmont (20)

TNEEL-NE Theoretical Perspectives Learning Activ.docx
TNEEL-NE Theoretical Perspectives   Learning Activ.docxTNEEL-NE Theoretical Perspectives   Learning Activ.docx
TNEEL-NE Theoretical Perspectives Learning Activ.docx
 
To Board of Directors of Reed Elsevier Plc.From Report.docx
To       Board of Directors of Reed Elsevier Plc.From   Report.docxTo       Board of Directors of Reed Elsevier Plc.From   Report.docx
To Board of Directors of Reed Elsevier Plc.From Report.docx
 
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docxTMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
TMGT 361Assignment VII A InstructionsLectureEssayControl Ch.docx
 
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docxTitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
TitleHOW DIVERSITY WORKS. AuthorsPhillips, Katherine W.1.docx
 
TitleAuthorSetting.docx
TitleAuthorSetting.docxTitleAuthorSetting.docx
TitleAuthorSetting.docx
 
TitleAJS504 Week 1 AssignmentName of StudentI.docx
TitleAJS504 Week 1 AssignmentName of StudentI.docxTitleAJS504 Week 1 AssignmentName of StudentI.docx
TitleAJS504 Week 1 AssignmentName of StudentI.docx
 
TitleABC123 Version X1Working in Diverse GroupsPSY.docx
TitleABC123 Version X1Working in Diverse GroupsPSY.docxTitleABC123 Version X1Working in Diverse GroupsPSY.docx
TitleABC123 Version X1Working in Diverse GroupsPSY.docx
 
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docxTitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
TitleBUS-FP3061 – Fundamentals of AccountingRatioYear .docx
 
TitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docxTitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docx
 
TitleABC123 Version X1Week Two Assignment Worksheet.docx
TitleABC123 Version X1Week Two Assignment Worksheet.docxTitleABC123 Version X1Week Two Assignment Worksheet.docx
TitleABC123 Version X1Week Two Assignment Worksheet.docx
 
TitleABC123 Version X1Weekly Overview Week FourHCS.docx
TitleABC123 Version X1Weekly Overview Week FourHCS.docxTitleABC123 Version X1Weekly Overview Week FourHCS.docx
TitleABC123 Version X1Weekly Overview Week FourHCS.docx
 
TitleABC123 Version X1Week One Assignment Worksheet.docx
TitleABC123 Version X1Week One Assignment Worksheet.docxTitleABC123 Version X1Week One Assignment Worksheet.docx
TitleABC123 Version X1Week One Assignment Worksheet.docx
 
TitleABC123 Version X1Week 4 Practice Worksheet.docx
TitleABC123 Version X1Week 4 Practice Worksheet.docxTitleABC123 Version X1Week 4 Practice Worksheet.docx
TitleABC123 Version X1Week 4 Practice Worksheet.docx
 
TitleABC123 Version X1Workplace Safety Plan Worksheet.docx
TitleABC123 Version X1Workplace Safety Plan Worksheet.docxTitleABC123 Version X1Workplace Safety Plan Worksheet.docx
TitleABC123 Version X1Workplace Safety Plan Worksheet.docx
 
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docxTitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
TitleABC123 Version X1Week 4 Practice Worksheet PSY.docx
 
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docxTMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
TMGT 361Assignment V InstructionsLectureEssayStatistics 001.docx
 
TL3127 Creativity & Innovation in Organisations – 201718Assig.docx
TL3127 Creativity & Innovation in Organisations – 201718Assig.docxTL3127 Creativity & Innovation in Organisations – 201718Assig.docx
TL3127 Creativity & Innovation in Organisations – 201718Assig.docx
 
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docxTitle The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
Title The Ship of LoveDate ca. 1500Period RenaissanceRela.docx
 
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docxTitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
TitleABC123 Version X1Week 1 Practice WorksheetPSY.docx
 
TitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docx
TitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docxTitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docx
TitleCollapseTop of FormTotal views 3 (Your views 1)Ar.docx
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 

Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx

  • 1. Threat Mitigation Worksheet Form # TM01 Page ____ of _____ Business Name: Address: Facility # 001 Contact: Phone number: E-mail: Asset Threat Mitigation Techniques
  • 2. Threat Identification and Assessment Worksheet Form # TIDA01 Page ____ of _____ Business Name: Address: Facility # 001 Contact: Phone number:
  • 3. E-mail: Threat POC Assets Affected Consequence (C, S, M, I) Severity (C, S, M, I)
  • 4. Asset Identification Worksheet Form # AID01 Page ____ of _____ Business Name: Address:
  • 5. Facility # 001 Contact: Phone Number: E-mail: Asset Quantity Department or Location Value Priority C N D N/A C N D N/A C N D N/A
  • 6. C N D N/A C N D N/A C N D N/A C N D N/A C N D N/A
  • 7. C N D N/A C N D N/A C N D N/A Business Process Identification Worksheet Form # BPID01 Page ____ of _____ Business Name: Address: Facility # 001 Contact: Phone number: E-mail: Business Process
  • 8. Priority Department Assets Used C N D N/A C N D N/A C N D N/A C N D N/A C N D N/A C N D N/A C N D
  • 9. N/A C N D N/A C N D N/A C N D N/A C N D N/A Risk Assessment documentation templates are located within this section. Make additional copies as needed. In a real risk analysis process, one of the first steps is meeting with all department managers, upper management, employee representatives, and workers in the production environment, human resources staff, and other staff members to get their input. Without input from the people actually doing the work, you might not think of essential factors. That isn't possible here, so direct any questions you have to the instructor, or do independent research to find your answers. · First, identify the business processes that must continue for the organization to keep functioning—for example, collecting
  • 10. money from customers, receiving and processing sales, developing new products, and so on. Document major business processes that drive SunGrafix, using the Business Process column of the Business Process Identification Worksheet. (You need your imagination and some common sense for this step.) Assign a priority level to each process (using the priority rankings in the following list). Write down the department that performs the process, and leave the Assets Used column blank for now. Next, identify the organization's assets. Using the Asset Identification Worksheet that is provided in the Course Documents section on Blackboard, list each asset, its location, and approximate value, if known. (For multiple identical assets, describe the asset and list the quantity instead of listing each individual asset.) In organization-wide risk assessments, you would list all assets, including office furniture, industrial equipment, personnel, and other assets. For this project, stick to information technology assets, such as computers, servers, and networking equipment, etc. The information you enter depends on the network design you completed earlier. All the equipment needed to build your network should be listed here as well as any cabling in the facility. (Assume the facility is already wired for a computer network with network drops available for each computer.) Hint: Remember to list items such as electricity and your Internet connection.Next, determine which assets support each business process. On your Business Process Identification Worksheet, list the assets needed for each business process in the Assets Used column. · Critical — Absolutely necessary for business operations to continue. Loss of a critical process halts business activities. · Necessary — Contributes to smooth, efficient operations. Loss of a necessary process doesn't halt business operations but degrades working conditions, slows production, or contributes to errors. · Desirable — Contributes to enhanced performance and productivity and helps create a more comfortable working environment, but loss of a desirable process doesn't halt or
  • 11. negatively affect operations. · Next, determine which assets support each business process. On your Business Process Identification Worksheet, list the assets needed for each business process in the Assets Used column. · Each process should be documented and have a priority assigned to it. Next, transfer the priority rankings to your Asset Identification Worksheet. Now you know which assets are the most critical to restore and warrant the most expense and effort to secure. You also have the documentation to back up your security actions for each item. · The final step is assessing existing threats. The table below shows examples of ways to evaluate some types of threats and suggests ways to quantify them. On the Threat Identification and Assessment Worksheet, list each possible threat. Be sure to consider threats from geographic and physical factors, personnel, malicious attack or sabotage, and accidents. Also, examine the facility diagram you created for flaws in the facility layout or structure that could pose a threat, such as air- conditioning failure or loss of electrical service. Assess the probability of occurrence (POC) on a 1 to 10 scale, with 1 being the lowest and 10 the highest, and assign those ratings in the POC column for each threat. Type of Threat How to Quantify Severe rainstorm, tornado, hurricane, earthquake, wilderness fire, or flood Collect data on frequency, severity, and proximity to facilities. Evaluate the past quality and speed of local and regional emergency response systems to determine whether they helped minimize loss. Train derailment, auto/ truck accident, toxic air pollution
  • 12. caused by accident, or plane crash Collect data on the proximity of railroads, highways, and airports to facilities. Evaluate the construction quality of transportation systems and the rate of serious accidents on each system. Building explosion or fire Collect data on the frequency and severity of past incidents. Evaluate local emergency response to determine its effectiveness. Militant group attacking facilities, riot, or civil unrest Collect data on the political stability of the region where facilities are located. Compile and evaluate a list of groups that might have specific political or social issues with the Organization. Computer hack (external) or computer fraud (internal) Examine data on the frequency and severity of past incidents. Evaluate the effectiveness of existing computer security measures. · Next, using the Asset Identification Worksheet, determine which assets would be affected by each threat. List those assets in the Assets Affected column of the Threat Identification and Assessment Worksheet. For an electrical outage, for example, list all assets requiring electricity to operate; for a hardware failure, list all assets a hardware failure would disrupt, damage, or destroy · In the Consequence column, enter the consequences of the threat occurring, using the following designations: Next, rate the severity of each threat in the Severity column, using the
  • 13. same designations as in the preceding list for consequences (C, S, M, or I). You derive these ratings by combining the probability of occurrence, the asset's priority ranking, and the potential consequences of a threat occurring. For example, if an asset has a Critical (C) priority ranking and a Catastrophic (C) consequence rating, it has a Catastrophic (C) severity rating. If you have mixed or contradictory ratings, you need to re- evaluate the asset and use common sense. A terrorist attack that destroys the facility and kills half the staff might have a probability of occurrence (POC) of only 1 (depending on your location), but if it happened, the consequences would definitely be catastrophic. Even so, because of the low POC, you wouldn't necessarily rank its severity as catastrophic. · Catastrophic (C)—Total loss of business processes or functions for one week or more. Potential complete failure of business. · Severe (S)—Business would be unable to continue functioning for 24 to 48 hours. Losses of revenue, damage to reputation or confidence, reduction of productivity, complete loss of critical data or systems. · Moderate (M)—Business could continue after an interruption of no more than 4 hours. Some loss of productivity and damage or destruction of important information or systems. · Insignificant (I)—Business could continue functioning without interruption. Some cost incurred for repairs or recovery. Minor equipment or facility damage. Minor productivity loss and little or no loss of important data. · Finally, on the Threat Mitigation Worksheet, list assets that are ranked as the most critical and threatened with the highest severity. In the Mitigation Techniques column, list recommendations for mitigating threats to those assets. For example, to mitigate the threat of an electrical outage damaging a critical server, you might suggest a high-end uninterruptible power supply (UPS).