SlideShare a Scribd company logo
Risk Assessment Report
Information Systems Risk Assessment
Report
For
BARRATT & ASSOCIATES LIMITED
(B&A)
BY: Eugene Mukuka
Date: 13
th
November, 2015
i
Risk Assessment Report
TABLE OF CONTENT
INTRODUCTION…………………………………………………………………………………
……………….. 1
RISK CLASSIFICATIONS......................................................................................................1
VULNERABILITIES, THREATS, AND RISKS.........................................................................2
1.
ii
Risk Assessment Report
2. INTRODUCTION
Information Systems technology as a technology with the fastest rate of development
and application in all sectors of business, requires adequate protection to provide high
security. The aim of the risk analysis applied on an information system is to identify and
evaluate threats, vulnerabilities and risks associated with the system in place. IT assets
are exposed to risk of damage or loss. IT security involves protecting the hardware and
information stored electronically. That protection validates data integrity, availability and
confidentiality. Nowadays, there are many types of computer crimes; money theft 44%,
damage of software 16%, theft of information 16%, alteration of data 12%, theft of
services 10%, trespass 2% (Boran, 2003).
In this report I will look at the weaknesses/vulnerabilities of B&A Information System,
potential threats to it and its associated risks. As an agency specialized in debt
collection with over 300 employees at different offices in the UK; protecting its client and
the information that resides on its network is number one top priority.
3. RISK CLASSIFICATION
Risk Classifications
Risk Level Risk Description
High The loss of confidentiality, integrity, or availability could be expected to
have a severe or catastrophic adverse effect on B&A operations, its
Assets or on its employees.
Moderat
e
The loss of confidentiality, integrity, or availability could be expected to
have a serious adverse effect on B&A operations, its Assets or on its
employees.
1
Risk Assessment Report
Risk Level Risk Description
Low The loss of confidentiality, integrity, or availability could be expected to
have a limited adverse effect on B&A operations, its Assets or on its
employees.
4. VULNERABILITIES, THREATS AND RISK
Vulnerabilities, Threats, and Risks
2
Risk Assessment Report
Risk
No.
Vulnerability Threat
Risk of
Compromise
of
Risk Summary
1
No firewall
protection in B&A
system.
Computer crime
Malicious use
System compromise
Unauthorized use
Confidentiality
and integrity of
B&A data.
This system has no
firewall installed on
it this can result in
increasing the
likelihood of other
risks being
exploited
2
Use of outdated
OS and
unsupported
Platforms
Computer crime,
malicious use,
system compromise,
unauthorized access
Confidentiality
and integrity of
B&A data
Windows XP
running on most
B&A Laptops is
unsupported OS,
and Windows
Server 2003
support ended in
July 2015.
3
Risk Assessment Report
Risk
No.
Vulnerability Threat
Risk of
Compromise
of
Risk Summary
3
Remote access
to the system not
properly
monitored.
System compromise
Unauthorized
access
Confidentiality
and integrity of
B&A data.
Remote access to
system if not
monitored well,
especially that no
firewalls have been
put in place, may
lead to
unauthorized
access that could
result in
compromise of
confidentiality and
integrity of B&A
Financial data.
4
Hardware
Issues/
Equipment
Failure or loss of
portable devices
System Unavailable Inability to
access the
system.
Loss of portable
devises like USB &
stick or equipment
would result in the
entire system or
some portion of the
system being
unavailable.
4
Risk Assessment Report
Risk
No.
Vulnerability Threat
Risk of
Compromise
of
Risk Summary
5
Inadequate
Database
Support- CPU
Power Limit
malicious use,
system compromise,
unauthorized access
Confidentiality
and integrity of
corporate data,
inability to
access and
recover
corporate data.
Database failure
could result from
improper
representation of
financial information
for B&A clients.
6
Working away
from home
hackers, malicious
use, system
compromise,
unauthorized access
Confidentiality
and integrity of
corporate data
Loss of data on
portable devices
can result in serious
legal issues for B&A
ltd.
7
System
Compromise
hackers, malicious
use, unauthorized
access
Confidentiality
and integrity of
corporate data.
Compromise
system could result
in data theft, data
corruption,
application system
alteration or
disruption.
5
Risk Assessment Report
Risk
No.
Vulnerability Threat
Risk of
Compromise
of
Risk Summary
8
Poor Physical
Security- badge
readers.
hackers, malicious
use, system
compromise,
unauthorized access
Confidentiality
and integrity of
corporate data.
Poor physical
security could allow
personal access to
staff workstations or
Computer Center
assets which could
result in data theft,
data corruption,
application system
alteration or
disruption.
9
Functional
Lockout
System
unavailability
Inability to
access the
system.
The inability of staff
to access the
system
infrastructure or
applications could
result in the inability
to access the
system. This will
compromise the
integrity and
availability of
information
6
Risk Assessment Report
Risk
No.
Vulnerability Threat
Risk of
Compromise
of
Risk Summary
10
Environ-
Mental Issues
Loss of AC or
power.
Inability to
access the
system.
Environmental
issues could result
in the inability to
access and
maintain server
hardware.
11
Natural Disaster Hurricanes, floods,
and other weather
phenomenon.
Inability to
access the
system.
Natural disasters
could interrupt
power to B&A
Workstations and
make it impossible
for staff to support
the server
environment thus
disabling access to
web applications,
exchange servers,
oracle databases
and all the
accessible files of
B&A Ltd.
7
Risk Assessment Report
5. CONCLUSION
The above identified system risks my not be completely wiped out, but B & A Ltd can at
least minimize them by putting up stringent measures to address the risk. Any
organizations information system is vulnerable to different types of threats associate to
different types of risks. An enterprise firewall and intrusion-monitoring tools may be
sufficient to address possible compromise of some of the systems threats, while other
exposures may involve the business rules themselves, demanding a change to the core
logic of the organization. Use of latest IT/IS platform will help B&A Ltd to have a well
secure platform from its system providers, this will later give its clients confidence even
when submitting their information. All in all security controls should be in place.
6. REFFERENCES
Laban, M., Krnjet in, S., & Niko lic, B. (2007). Risk management and risk assessment in the
enterprise.
Symposium about Occupational Safety and Health, Novi Sad, pp. 44-57
Boran, S., (2003).IT security cook book. Boran Consulting.
Risk Management. (2006). Implementation principles and Inventories for Risk
Management/Risk Assess-ment methods and tools. Conducted by the Technical Department of
ENISA Section Risk Manage-ment, June 2006.
Carl Claunch, (2015). Managing risk after support for windows Server 2003 end,
ComputerWeekly.com
http://www.computerweekly.com/feature/Managing-risk-after-support-for-Windows-Server-
2003-ends accessed on 9/11/2015
Carl Claunch, (2015). Managing risk after support for windows server 2003 ends,
ComputerWeekly.com
8

More Related Content

What's hot

A New Approach to Healthcare Security
A New Approach to Healthcare SecurityA New Approach to Healthcare Security
A New Approach to Healthcare Security
Angel Villar Garea
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
Rahul Tyagi
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
Deepak Bansal, CPA CISSP
 
3rd party information security assessment guideline
3rd party information security assessment guideline3rd party information security assessment guideline
3rd party information security assessment guideline
Priyanka Aash
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
FireEye, Inc.
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
Priyanka Aash
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
- Mark - Fullbright
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
FireEye, Inc.
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
CAS
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
Kim Jensen
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
Fletcher Media
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystepAllan Crowe PCIP
 
Malvin proposal
Malvin proposalMalvin proposal
Malvin proposal
malvin kamba
 
Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
Josef Sulca Cueva
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
David Sweigert
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
David Sweigert
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
IRJET Journal
 

What's hot (18)

A New Approach to Healthcare Security
A New Approach to Healthcare SecurityA New Approach to Healthcare Security
A New Approach to Healthcare Security
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
3rd party information security assessment guideline
3rd party information security assessment guideline3rd party information security assessment guideline
3rd party information security assessment guideline
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
 
Malvin proposal
Malvin proposalMalvin proposal
Malvin proposal
 
Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 

Viewers also liked

Assure method 2
Assure method 2Assure method 2
Assure method 2
k_woood
 
Machote de mecanismos
Machote de mecanismosMachote de mecanismos
Machote de mecanismos
Ligia Lara
 
Abstract structural and stratigraphic implications of the north bounding fau...
Abstract  structural and stratigraphic implications of the north bounding fau...Abstract  structural and stratigraphic implications of the north bounding fau...
Abstract structural and stratigraphic implications of the north bounding fau...
Dexter Marsh
 
Silla de ruedas y tiro al blanco
Silla de ruedas y tiro al blancoSilla de ruedas y tiro al blanco
Silla de ruedas y tiro al blanco
Andrea Jiménez
 
Programación de robótica educativa
Programación de robótica educativaProgramación de robótica educativa
Programación de robótica educativa
Jeison Chaves Cordero
 
Katalog
KatalogKatalog
Katalogmustix
 
NYP RA and CAP april 2016
NYP RA and CAP april 2016 NYP RA and CAP april 2016
NYP RA and CAP april 2016
data brackets
 
13 a final-portfolio-2
13 a final-portfolio-213 a final-portfolio-2
13 a final-portfolio-2
Shelley Tiffany
 
US7731837 Oxidatively regenerable adsorbents for sulfur removal - SW PennState
US7731837 Oxidatively regenerable adsorbents for sulfur removal - SW PennStateUS7731837 Oxidatively regenerable adsorbents for sulfur removal - SW PennState
US7731837 Oxidatively regenerable adsorbents for sulfur removal - SW PennStateShingo Watanabe (渡邊真悟)
 
How Government jobs are differentiated from Private Sector jobs
How Government jobs are differentiated from Private Sector jobsHow Government jobs are differentiated from Private Sector jobs
How Government jobs are differentiated from Private Sector jobs
B. K. Vijay
 
GI - STR389 - Permaroof Staff Training
GI - STR389 - Permaroof Staff TrainingGI - STR389 - Permaroof Staff Training
GI - STR389 - Permaroof Staff TrainingTom Chapman
 
Analisis propuestageneral
Analisis propuestageneralAnalisis propuestageneral
Analisis propuestageneral
Jonathan MH
 

Viewers also liked (13)

Assure method 2
Assure method 2Assure method 2
Assure method 2
 
Machote de mecanismos
Machote de mecanismosMachote de mecanismos
Machote de mecanismos
 
Abstract structural and stratigraphic implications of the north bounding fau...
Abstract  structural and stratigraphic implications of the north bounding fau...Abstract  structural and stratigraphic implications of the north bounding fau...
Abstract structural and stratigraphic implications of the north bounding fau...
 
Silla de ruedas y tiro al blanco
Silla de ruedas y tiro al blancoSilla de ruedas y tiro al blanco
Silla de ruedas y tiro al blanco
 
asr _resume
asr _resumeasr _resume
asr _resume
 
Programación de robótica educativa
Programación de robótica educativaProgramación de robótica educativa
Programación de robótica educativa
 
Katalog
KatalogKatalog
Katalog
 
NYP RA and CAP april 2016
NYP RA and CAP april 2016 NYP RA and CAP april 2016
NYP RA and CAP april 2016
 
13 a final-portfolio-2
13 a final-portfolio-213 a final-portfolio-2
13 a final-portfolio-2
 
US7731837 Oxidatively regenerable adsorbents for sulfur removal - SW PennState
US7731837 Oxidatively regenerable adsorbents for sulfur removal - SW PennStateUS7731837 Oxidatively regenerable adsorbents for sulfur removal - SW PennState
US7731837 Oxidatively regenerable adsorbents for sulfur removal - SW PennState
 
How Government jobs are differentiated from Private Sector jobs
How Government jobs are differentiated from Private Sector jobsHow Government jobs are differentiated from Private Sector jobs
How Government jobs are differentiated from Private Sector jobs
 
GI - STR389 - Permaroof Staff Training
GI - STR389 - Permaroof Staff TrainingGI - STR389 - Permaroof Staff Training
GI - STR389 - Permaroof Staff Training
 
Analisis propuestageneral
Analisis propuestageneralAnalisis propuestageneral
Analisis propuestageneral
 

Similar to Risk assessment report

System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
Biagio Botticelli
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
IT-Audit C&A
IT-Audit C&AIT-Audit C&A
IT-Audit C&AMang Sum
 
IE Exploit Protection
IE Exploit ProtectionIE Exploit Protection
IE Exploit Protection
Kim Jensen
 
The notorious nine_cloud_computing_top_threats_in_2013
The notorious nine_cloud_computing_top_threats_in_2013The notorious nine_cloud_computing_top_threats_in_2013
The notorious nine_cloud_computing_top_threats_in_2013
Vinoth Sivasubramanan
 
Information security policy
Information security policyInformation security policy
Information security policy
BalachanderThilakar1
 
EBS 11i 1213 upgrade
EBS 11i 1213 upgradeEBS 11i 1213 upgrade
EBS 11i 1213 upgrade
Antonio Rubio
 
Nap vpn stepby_step
Nap vpn stepby_stepNap vpn stepby_step
Nap vpn stepby_step
Mahmoudmagdy Elenany
 
Guia implementacion seguridad oracle 12c
Guia implementacion seguridad oracle 12cGuia implementacion seguridad oracle 12c
Guia implementacion seguridad oracle 12c
Otto Paiz
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET Journal
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Substation Cyber Security
Substation Cyber SecuritySubstation Cyber Security
Substation Cyber Security
Schneider Electric
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
Information Security Awareness Group
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
LinkedIn
 
oracle10g datagurad
oracle10g dataguradoracle10g datagurad
oracle10g dataguradNst Tnagar
 
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
Ioannis Aligizakis, M.Sc.
 
What To Do If Compromised - Fraud Control and Investigations Procedures
What To Do If Compromised - Fraud Control and Investigations ProceduresWhat To Do If Compromised - Fraud Control and Investigations Procedures
What To Do If Compromised - Fraud Control and Investigations Procedures
- Mark - Fullbright
 

Similar to Risk assessment report (20)

System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
IT-Audit C&A
IT-Audit C&AIT-Audit C&A
IT-Audit C&A
 
IE Exploit Protection
IE Exploit ProtectionIE Exploit Protection
IE Exploit Protection
 
The notorious nine_cloud_computing_top_threats_in_2013
The notorious nine_cloud_computing_top_threats_in_2013The notorious nine_cloud_computing_top_threats_in_2013
The notorious nine_cloud_computing_top_threats_in_2013
 
Information security policy
Information security policyInformation security policy
Information security policy
 
EBS 11i 1213 upgrade
EBS 11i 1213 upgradeEBS 11i 1213 upgrade
EBS 11i 1213 upgrade
 
Nap vpn stepby_step
Nap vpn stepby_stepNap vpn stepby_step
Nap vpn stepby_step
 
FMEA Final Project
FMEA Final ProjectFMEA Final Project
FMEA Final Project
 
Guia implementacion seguridad oracle 12c
Guia implementacion seguridad oracle 12cGuia implementacion seguridad oracle 12c
Guia implementacion seguridad oracle 12c
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Substation Cyber Security
Substation Cyber SecuritySubstation Cyber Security
Substation Cyber Security
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 
oracle10g datagurad
oracle10g dataguradoracle10g datagurad
oracle10g datagurad
 
Data guard
Data guardData guard
Data guard
 
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
 
What To Do If Compromised - Fraud Control and Investigations Procedures
What To Do If Compromised - Fraud Control and Investigations ProceduresWhat To Do If Compromised - Fraud Control and Investigations Procedures
What To Do If Compromised - Fraud Control and Investigations Procedures
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Risk assessment report

  • 1. Risk Assessment Report Information Systems Risk Assessment Report For BARRATT & ASSOCIATES LIMITED (B&A) BY: Eugene Mukuka Date: 13 th November, 2015 i
  • 2. Risk Assessment Report TABLE OF CONTENT INTRODUCTION………………………………………………………………………………… ……………….. 1 RISK CLASSIFICATIONS......................................................................................................1 VULNERABILITIES, THREATS, AND RISKS.........................................................................2 1. ii
  • 3. Risk Assessment Report 2. INTRODUCTION Information Systems technology as a technology with the fastest rate of development and application in all sectors of business, requires adequate protection to provide high security. The aim of the risk analysis applied on an information system is to identify and evaluate threats, vulnerabilities and risks associated with the system in place. IT assets are exposed to risk of damage or loss. IT security involves protecting the hardware and information stored electronically. That protection validates data integrity, availability and confidentiality. Nowadays, there are many types of computer crimes; money theft 44%, damage of software 16%, theft of information 16%, alteration of data 12%, theft of services 10%, trespass 2% (Boran, 2003). In this report I will look at the weaknesses/vulnerabilities of B&A Information System, potential threats to it and its associated risks. As an agency specialized in debt collection with over 300 employees at different offices in the UK; protecting its client and the information that resides on its network is number one top priority. 3. RISK CLASSIFICATION Risk Classifications Risk Level Risk Description High The loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic adverse effect on B&A operations, its Assets or on its employees. Moderat e The loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect on B&A operations, its Assets or on its employees. 1
  • 4. Risk Assessment Report Risk Level Risk Description Low The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect on B&A operations, its Assets or on its employees. 4. VULNERABILITIES, THREATS AND RISK Vulnerabilities, Threats, and Risks 2
  • 5. Risk Assessment Report Risk No. Vulnerability Threat Risk of Compromise of Risk Summary 1 No firewall protection in B&A system. Computer crime Malicious use System compromise Unauthorized use Confidentiality and integrity of B&A data. This system has no firewall installed on it this can result in increasing the likelihood of other risks being exploited 2 Use of outdated OS and unsupported Platforms Computer crime, malicious use, system compromise, unauthorized access Confidentiality and integrity of B&A data Windows XP running on most B&A Laptops is unsupported OS, and Windows Server 2003 support ended in July 2015. 3
  • 6. Risk Assessment Report Risk No. Vulnerability Threat Risk of Compromise of Risk Summary 3 Remote access to the system not properly monitored. System compromise Unauthorized access Confidentiality and integrity of B&A data. Remote access to system if not monitored well, especially that no firewalls have been put in place, may lead to unauthorized access that could result in compromise of confidentiality and integrity of B&A Financial data. 4 Hardware Issues/ Equipment Failure or loss of portable devices System Unavailable Inability to access the system. Loss of portable devises like USB & stick or equipment would result in the entire system or some portion of the system being unavailable. 4
  • 7. Risk Assessment Report Risk No. Vulnerability Threat Risk of Compromise of Risk Summary 5 Inadequate Database Support- CPU Power Limit malicious use, system compromise, unauthorized access Confidentiality and integrity of corporate data, inability to access and recover corporate data. Database failure could result from improper representation of financial information for B&A clients. 6 Working away from home hackers, malicious use, system compromise, unauthorized access Confidentiality and integrity of corporate data Loss of data on portable devices can result in serious legal issues for B&A ltd. 7 System Compromise hackers, malicious use, unauthorized access Confidentiality and integrity of corporate data. Compromise system could result in data theft, data corruption, application system alteration or disruption. 5
  • 8. Risk Assessment Report Risk No. Vulnerability Threat Risk of Compromise of Risk Summary 8 Poor Physical Security- badge readers. hackers, malicious use, system compromise, unauthorized access Confidentiality and integrity of corporate data. Poor physical security could allow personal access to staff workstations or Computer Center assets which could result in data theft, data corruption, application system alteration or disruption. 9 Functional Lockout System unavailability Inability to access the system. The inability of staff to access the system infrastructure or applications could result in the inability to access the system. This will compromise the integrity and availability of information 6
  • 9. Risk Assessment Report Risk No. Vulnerability Threat Risk of Compromise of Risk Summary 10 Environ- Mental Issues Loss of AC or power. Inability to access the system. Environmental issues could result in the inability to access and maintain server hardware. 11 Natural Disaster Hurricanes, floods, and other weather phenomenon. Inability to access the system. Natural disasters could interrupt power to B&A Workstations and make it impossible for staff to support the server environment thus disabling access to web applications, exchange servers, oracle databases and all the accessible files of B&A Ltd. 7
  • 10. Risk Assessment Report 5. CONCLUSION The above identified system risks my not be completely wiped out, but B & A Ltd can at least minimize them by putting up stringent measures to address the risk. Any organizations information system is vulnerable to different types of threats associate to different types of risks. An enterprise firewall and intrusion-monitoring tools may be sufficient to address possible compromise of some of the systems threats, while other exposures may involve the business rules themselves, demanding a change to the core logic of the organization. Use of latest IT/IS platform will help B&A Ltd to have a well secure platform from its system providers, this will later give its clients confidence even when submitting their information. All in all security controls should be in place. 6. REFFERENCES Laban, M., Krnjet in, S., & Niko lic, B. (2007). Risk management and risk assessment in the enterprise. Symposium about Occupational Safety and Health, Novi Sad, pp. 44-57 Boran, S., (2003).IT security cook book. Boran Consulting. Risk Management. (2006). Implementation principles and Inventories for Risk Management/Risk Assess-ment methods and tools. Conducted by the Technical Department of ENISA Section Risk Manage-ment, June 2006. Carl Claunch, (2015). Managing risk after support for windows Server 2003 end, ComputerWeekly.com http://www.computerweekly.com/feature/Managing-risk-after-support-for-Windows-Server- 2003-ends accessed on 9/11/2015 Carl Claunch, (2015). Managing risk after support for windows server 2003 ends, ComputerWeekly.com 8