You have been hired as a consultant

Assignment Help Project Management
Reference no: EM131200575 , Length: 2500 Words

Creation of a risk assessment and mitigation strategy for a fictional airport that includes four distinct organizations. Based on a provided scenario, you will develop a report for the management team that includes personnel recommendations for IT team members, a comprehensive assessment of IT security risks, and suggested strategies and approaches for minimizing the identified risks.

The Scenario: You have been hired as a consultant to conduct a comprehensive risk assessment and provide a risk assessment and mitigation report for an airport.

The airport has four different organizations:

1. Airport authority
2. Four flight service providers (four airlines)
3. Airport restaurant
4. Guests

The airport authority maintains a system that handles the flight management controls. This system is made up of a database server, an application server, and a web server.

The four flight service providers have only back-end access to their own dedicated server in the airport authority network and not to any other provider's back-end systems. Each flight service provider has a system made up of a database server, an application server, and a web server that allows patrons to reserve and purchase tickets.

The restaurant provides food for both airport employees as well as travelers. The restaurant's systems are used to maintain customer transactions, human resource functions (payroll and benefits information), and vendor ordering.

Guest users have wireless access to a high-speed internet connection, which is also shared among all the users in all organizations.
The wireless access uses a common password. Guest users should not have access to the other organizations within the airport. The users obtain IP addresses automatically. The airport authority has 27 users, and the flight service providers have 85 users. The maximum number of guests is estimated to be 100.

Software updates that address security vulnerabilities are assessed by the airport security team. The team verifies whether the vulnerability is applicable to their environment. If it is, they analyze the circumstances under which vulnerabilities could be exploited and the possible business impact on organizational assets and business continuity.

After the evaluations are complete, the security team works with the configuration management administrator to manage software updates. The administrator reviews the security team's list of critical security updates and runs a report to see how many computers on the network are potentially vulnerable to the exploit addressed in the security update.
The organization has a content-filtering firewall in place; however, there are currently no filtering rules. There has been some discussion in the past to mitigate this, but the organization is looking for recommendations on how this should be configured.
Critical Elements: Your 8- to 10-page risk assessment and mitigation strategy must include the following critical elements:

1. Team Information

a. Identification of all stakeholders.
b. Job Description. Create a job description for the chief security officer the airport plans to hire. Include desired qualifications and experiences, as well as responsibilities and daily tasks.
c. Security Certification Recommendations. Recommend certifications for the current IT staff. Provide a brief rational for your recommendations.

2. Risk Assessment

As part of your risk assessment, based on the provided scenario information, include an analysis of the security risks in the areas listed below.

a. Security and Business Processes. Summarize the impact of confidentiality, integrity, availability, and privacy on business processes.
b. Legal, Regulatory, Ethical, and Social Issues. Discuss key ethical, social, and legal issues related to IT security. Identify at least three laws or regulations that pertain to the organization.
c. Viruses and Malicious Software. Identify how the organization detects, controls, and prevents viruses and other malicious software.
d. Web Server Security Strategies. Assess the usage of browsers, cryptographic posture, and server and protocol securities such as IPsec, SSL, and VPN.
e. External Threats. Analyze necessary firewalls, intrusion detection, and intrusion prevention systems.
The results of the risk assessment will guide the development of the company's risk mitigation strategy.

3. Mitigation Strategy

As a result of the items identified in the risk assessment, develop a mitigation strategy that addresses the security risks outlined in the risk assessment. As part of your strategy, address the following:
a. Employee Guidelines. Develop guidelines to share with employees. The guidelines should summarize the proposed approach to confidentiality, integrity, availability, and privacy.
b. Legal, Regulatory, Ethical, and Social Issues. Provide a detailed explanation of how the IT department will mitigate identified ethical, social, or legal issues. Be sure to address legal or regulatory gaps.
c. Viruses and Malicious Software. Describe new approaches for the detection, control, and prevention of viruses and other malicious software.
d. Web Server Security Strategies. Detail necessary changes to the websites, browser settings, and remote access.
e. External Threats. Develop a comprehensive plan to address risks from external threats.

4. References

Verified Expert

Introduction:- Risk mitigation planning is the procedure of creating choices and activities to upgrade opportunities and decrease dangers to venture goals. Risk mitigation implementation is the procedure of executing danger relief activities. Risk mitigation progress observing incorporates following distinguished dangers, recognizing new dangers, and assessing danger procedure adequacy all through the venture. General rules for applying risk mitigation taking care of alternatives are appeared. These choices depend on the surveyed mix of the likelihood of event and seriousness of the outcome for a distinguished risk. These rules are fitting for some, however not all, undertakings and projects.

Reference no: EM131200575

Questions Cloud

Explain why you picked it and what you hope to learn : As you list each indicator, explain why you picked it and what you hope to learn from that particular indicator. For example, you might choose "Per Capita Income" explaining that your product would appeal only to the wealthy so one would need to k..
Calculate the contribution margin per unit : Calculate the Contribution margin per unit, Total contribution margin, Break-even Quantity and Quantity to make $90,000 Target Income.
Which lockers will finally remain open : That is if the locker is closed, he or she will open it; if it is open, he or she will close it. The fourth student will then reverse every fourth locker, and so on until all 1000 students in turn have entered the building and reversed the proper ..
What is second-law efficiency for the combined system : The two exhaust flows are mixed adiabatically to produce saturated vapor at 1.2 MPa.what is second-law efficiency for the combined system?
You have been hired as a consultant : You have been hired as a consultant to conduct a comprehensive risk assessment and provide a risk assessment and mitigation report for an airport. The airport has four different organizations:
Describe a business that you may own some day : Describe a business that you may own some day or that you currently own. (Even if you never plan to own a business, pretend as if you will do so for the purposes of this assignment.)
How much hot water would you need to add : A child's pool is eight feet in diameter and two feet high. It is filled by a garden hose up to a level of one foot. The children complain that it is too cold. Can you heat it up to an acceptable temperature using hot water from the house? How muc..
Briefly and as clearly as possible define parable : Provide an example of a parable. Students will choose one parable from the list provided below and prepare a modern day parable based on the selected text. In other words, rewrite the parable using modern language and modern life for a contemporar..
How would each of these issues affect stanfords report : How would each of these issues affect Stanford's report on the client financial statements? Do not draft the report that Stanford would issue for each situation. Be sure to answer each situation separately.

Reviews

Write a Review

Project Management Questions & Answers

  Evaluate the best conflict resolution

Two of your functional team members appear to have personality clashes and almost always assume opposite points of view during decision-making.

  Project managers to resist changes to the project baseline

Why is it important for project managers to resist changes to the project baseline and under what conditions would a project manager make changes to a baseline?

  How do changes affect budget schedules and costs of project

Identify and discuss three basic causes for requested changes to projects. How do you respond to change requests as a project manager? How do changes affect the budget, schedules, and costs?

  Define the term product

Using a relevant product within the hospitality or tourism sector answer the three following questions. Define the term product. Describe the four main product levels that applies to your chosen product.

  Explaining ancillary monitoring attributes

What kind of reports or other ancillary monitoring attributes should be documented at project termination? Why? How?

  What is the importance of experience when defining a wbs

What is the importance of experience when defining a WBS and what is the role of the Team in leveraging Project related experience?

  How is the performance with respect to cost and time

SIT374-SIT764: Project Management What are the CPI and SPI and How is the performance with respect to cost and time?

  Augmented reality technologies

What is augmented reality? Give an example. Describe how augmented reality technologies could be used in e-commerce. Discuss some of the unique features that must be taken into account when designing a mobile Web presence.

  Project management of applications

Project Management of Applications - Show the role of the project manager in the in-house development of a customized application.

  Improving communication in organizationsone of the most

improving communication in organizationsone of the most effective ways that we can improve our communication within the

  Since the hospitals project budgeting approach is under the

since the hospitals project budgeting approach is under the microscope due to several large public budget overruns

  Question about aggregate production planning

Question about Aggregate production planning - Determine the total cost using a one-month planning horizon

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd