Option 1: Understanding Risk Assessment Methodology
ITS360 Introduction to Cyber Security and Digital Crime
Option 1: Understanding Risk Assessment Methodology
Introduction
Consider the risk to "integrity of customer and financial data files on system" from "corruption of these files due to import of a worm/virus onto a system," as discussed in Problem 14.2 in your textbook. From the list shown in Table 15.3 in your textbook, select some suitable specific controls that could reduce this risk. Indicate which you believe would be most cost effective (CSU-Global course material – Module 5 Critical Thinking Assignment, 2018).
Security Risk Assessment Controls
Incident Response Team Controls
Measures Conducted to Prevent the Spread of Email Worms
Asset |
Threat/Vulnerability |
Existing Controls |
Likelihood |
Consequence |
Level of Risk |
Risk Priority |
Customer/Financial data files onto a system |
Corruption of files from worm/virus onto a system |
Antivirus software and user password |
Possible to almost certain |
Major |
E |
1 |
Considering the likelihood that the security patches and updates are not recently up to date there is a strong possibility of a worm or virus infection. This could cause major corruption
OPTION 1: UNDERSTANDING RISK ASSESSMENT METHODOLOGY 4
to their customer and financial data files. The level of risk is extreme because the existing controls will now have to be changed to prevent further corruption and loss of data from the data files. The risk priority would be a one due to the severity of file corruption (Stallings, W., & Brown, L., 2015).
Most Cost-Effective Security Control Measures
The following measures are the most cost effective to protect the assets against threats:
Conclusion
This paper has provided some suitable specific controls taken from the table 15.3 of the Stallings textbook which will help to reduce the risk and damage that could take place within the computer network of an organization from an email worm or virus. Included are measures to reduce and if possible block the spread of the worm/virus not only inside the organizational network but also block its spread out into the WWW internet.
OPTION 1: UNDERSTANDING RISK ASSESSMENT METHODOLOGY
References
CSU-Global Campus. (2018). Option #1: Understanding Risk Assessment Methodology
Retrieved from CSU-Global Campus, Module 5 Critical Thinking Assignment, ITS360 -
Introduction to Cybersecurity & Digital Crime website.
Stallings, W., & Brown, L. (2018). Computer security: Principles and Practice. Upper Saddle
River, NJ: Pearson Education, Inc.
Follow Us