The vulnerabilities and risk about an information system

Assignment Help Management Information Sys
Reference no: EM132146834

Assessing Information System Vulnerabilities and Risk

The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls).

The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies.

The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector.

Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General's (OIG) Final Audit Report, which can be found in open source searches.

Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits.

The breach ultimately resulted in removal of OPM's top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations.

There are nine steps that will help you create your final deliverables.

The deliverables for this project are as follows:

Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

Reference no: EM132146834

Questions Cloud

Differentiate acceptable from unacceptable job candidates : What Background investigations, if any, would you recommend to differentiate acceptable from unacceptable job candidates? Why?
Describe how such anomalies could be prevented : Data Anomalies - Explain in your own words using tables from your lab project. Also describe how such anomalies could be prevented.
Create policies for your x companys it infrastructure : Create Policies for your X company's IT infrastructure. Develop list of compliance laws required for X Company's contract .
Global warming of a given amount of carbon dioxide : Assume the effect on global warming of a given amount of carbon dioxide is four times that of methane. What should be the relative fine (tax) on emissions
The vulnerabilities and risk about an information system : The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known.
Write a post in the discussion stream : After reading Chapter Supporting Processes with ERP Systems, consider the following: The athletics director buys sports equipment from a supplier.
Research the history of the attack and those responsible : Research the history of the attack and those responsible. What did this exploit?
Calculate the payback period for each product : Lou Barlow, a divisional manager for Sage Company, His annual pay raises are determined by his division's ROI, Calculate the payback period for each product
What is your practical experience with physical security : In your current job, what are the physical security protocols that you are required to follow and explain the one you find most annoying?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd