Discuss risk treatment plan

Assignment Help Basic Computer Science
Reference no: EM131577491

Question: Assessment item 1 Threat and Risk Assessment Report Task Write a Threat and Risk Assessment...

Assessment item 1 Threat and Risk Assessment Report Task Write a Threat and Risk Assessment Report that assesses the findings of a gap analysis and articulates the most prominent risks and threats to the subject organisation - EvolveNet. The audience of the Threat and Risk Assessment Report is the SLT and Executive team of the target organisation and should be authored to a professional standard as would be expected in typical large organisation. The report must include o An assessment of the control gaps identified in the gap analysis report (provided) and risk presented to the organisation o Possible threat scenarios that the organisation is subject to due to the identified gaps o A list of prioritised short-term (tactical) and long-term (strategic) initiatives to address the identified risks o A copy of the threat matrix used for risk level rating A suggested heading structure is provided below

1. Executive Summary

2. Introduction

3. Organisational Assets

4. Threat Categories

5. Vulnerabilities and Threats (table including: vulnerabilities, threat scenarios, likelihood, impact, risk level)

6. Risk Treatment Plan (table including, recommended controls, vulnerabilities addressed, priority, owner)

7. Risk rating matrix Organisational Overview EvolveNet is an Australian VOIP company that supplies over-the- top VOIP services for residential and businesses customers.

Our key product is the the AnyPhone VOIP service that allows customers to make low-cost phone calls across the globe. Additional services include GlobalPhone, which provides a local phone number in 20 different countries. As a world leader, EvolveNet provides the VOIP platform for over 50 domestic and global telecommunication partners. EvolveNet provides a reliable, easily-to-configure, plug and play VOIP service.

Key Information Assets and Systems

- Customer database (~300,000 records)

- Call records (2,000,000 records per day)

- Internet-facing servers (website server, webmail, email, web service, DNS server)

- Internal servers (file, print, intranet, corporate PBX, DHCP and DNS servers)

- Self-service VOIP configuration website

- Web development and test systems

- Wholesale

- Customer-facing PBX and voicemail farm

- Staff workstations and laptops

- VPN concentrator

- Network routers and switches for corporate network

- Boarder and DMZ firewall

- EvolveNet Strategy

Reference no: EM131577491

Questions Cloud

Four functions of management : There are four functions of management: Planning, Organizing, Leading, and Controlling. For this question, outline how managers.
Calculate the total-spending function : Indicate on the graph the effect of an N$300 million increase in investment spending and comment on the magnitude of change in the equilibrium income relative.
Piece of real state that black inherited : Black, a minor, sells a piece of real state that Black inherited. Black spends the money rather foolishly and, by the time of adulthood, Black is deeply in debt
Piece of real state that black inherited : Black, a minor, sells a piece of real state that Black inherited. Black spends the money rather foolishly and, by the time of adulthood, Black is deeply in debt
Discuss risk treatment plan : Assessment item 1 Threat and Risk Assessment Report Task Write a Threat and Risk Assessment Report that assesses the findings of a gap analysis and articulates.
Why are competitive markets more efficient : Why are competitive markets more efficient? please explain hows no restriction to entry and exist affect the competitive market?
Total interest will you end up paying over the life of loan : how much total interest will you end up paying over the life of the loan?
Analyze the deviance using terms such as primary deviance : Analyze the deviance, using terms such as primary deviance, secondary deviance, retrospective labeling, and stigma.
Burden of principal repayment by spreading : Which of the following possible provisions of a bond indenture is designed to ease the burden of principal repayment by spreading it out over several years?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Display a message that shows the customer''s available credit

Available Credit The following steps should be followed in a program that calculates a customer's available credit

  Write a program that uses an array of structs

Write a program that uses an array of structs. The structs will have the following data attributes: integer i_value float f_value Allow the user to enter 10 different integers and 5 different float numbers.

  Event in delegation event model

What is an event in delegation event model used by Java programming language?

  Describe an array and its various implementations

Describe an array and its various implementations. Provide the C# code that would illustrate how to create, reference

  Describe the nonzero structure of the factors of the qr

Show that two matrices in adjacent iterations of the QR eigenvalue algorithm with a single explicit shift, Ak and Ak+1, are orthogonally similar.

  What is a suitable network design for an office space

What is a suitable network design for an office space with 4 cubicles, 1 office, 1 server room, conference room.  The design has a web server, file server, regular server with 6 computers, 3 color printers, and needs high speed internet and wireless ..

  Describe the legal requirements and ethical issues

Determine the expected results from tests and research based on the specific informational details provided and describe the legal requirements and ethical issues involved

  Describe the steps in the keypad polling routine

What distinguishes a control data value from a character data value for the LCD module. Describe the steps in the keypad polling routine

  Specific goal of an organization or individual

In this assignment, you will locate examples of how the use of digital media was used to communicate information to achieve a specific goal of an organization or individual.

  Compare a filtering firewall to a proxy firewall

Assume a configuration as in Figure 8.21, where the internal host under attack trusts the remote company user.

  What if any cascading behavior do you want to occur

Explain the interaction between the trigger in your answer to Project Question 7.61 and the COMPUTER-to-COMPUTER_ASSIGNMENT relationship. What, if any, cascading behavior do you want to occur? Explain how you can test to find out if it works the w..

  Prove that p(y|x=x)~bin(n-x,b/1-a)

Prove that p(y|X=x)~Bin(n-x,b/1-a) where x,y,z have multinomial distribution with parameters a,b,c and n.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd