Which vulnerability should be evaluated

Assignment Help Management Information Sys
Reference no: EM13756297

Management of information security


1. If an organization has three information assets to evaluate for risk management purposes as shown in the accompanying data, which vulnerability should be evaluated for additional controls first? Which vulnerability should be evaluated last?

Explain your reasons.

a. Switch L47 connects a network to the Internet. It has two vulnerabilities: (1)susceptibility to hardware failure with a likelihood of 0.2, (2) susceptibility to an SNMP buffer overflow attack with likelihood of 0.1. This switch has an impact rating of 90 and has no current controls in place. There is a 75 percent certainty of the assumption and data.

b. Server WebSrv6 hosts a company Web site and performs e-commerce transactions. It has Web server software that is vulnerable to attack via invalid Unicode values. The likelihood of such an attack is estimated at 0.1. The server has been assigned an impact value of 100, and a control has been implemented that reduces the impact of the vulnerability by 75 percent. There is an 80 percent certainty of the assumptions and data.

c. Operators use the MGMT45 control console to monitor operations in the server room. It has no passwords and is susceptible to unlogged misuse by the operators. Estimates show the likelihood of misuse is 0.1. There are no controls in place on this asset; which has an impact rating of 5. There is a 90 percent certainty of the assumptions and data.

Reference no: EM13756297

Questions Cloud

How does marketing mix help businesses create market segment : Describe the strategic marketing process and its three key phases of planning, implementation, and control - How does the marketing mix help businesses create market segments?
The topic is heart & neck vessels : The topic is heart & neck vessels (cardiovascular) 1. What effect does respiration have on the heart and why? 2. How does venous blood return to the heart?
Comparison of the traditional business type : We will focus on a comparison of the traditional business type (brick-and-mortar stores) versus the internet business type (e-commerce). Discuss the pros and cons of these two business types
Define and describe bell-lapadula and clark-wilson : Provide a description of the selected organization and touch points where data and databases exist to secure and guarantee integrity. Define and describe Bell-LaPadula and Clark-Wilson, and choose at least 1 other security model of your choice to de..
Which vulnerability should be evaluated : If an organization has three information assets to evaluate for risk management purposes as shown in the accompanying data, which vulnerability should be evaluated for additional controls first
Development of an individual during adolescence : What developmental milestones and behaviors signify an adolescent's attempt to transition from parental dependence to independence?
What is the osi model and why is it important : What is the OSI model and why is it important in understanding networking and What are the advantages of using a theoretical model to describe networking
What makes soil rich in north china and why is it important : What makes the soil rich in Northern China and why is it important?
Definition of the main objectives of the business process : A Comprehensive description of the business process including: definition of the main objectives of the business process

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain relational database management system

Relational DataBase Management System - Describe three advantages to using a Relational Database Management system

  What is an enterprise system

ES provides value both by increasing operating efficiency and by providing firm-wide information to help managers make better decisions and ES provide much valuable information for improving management decision making.

  Explain the domino''s business model

Domino's Sizzles with Pizza Tracker Case Study - Explain the Domino's business model? How successful has it been?

  B2b product introduction

Sales Management hardware and software available for B2B product introduction and determine and compare these sales management hardware and software. Create a comparative table to judge the merits of the different options available.

  Explain strategic mis categories in detail

Define MIS ? What are the characteristics of MIS and explain strategic MIS categories in detail. Give relevant examples.

  What do you supply chain management

What is Supply Chain Management and What is vertical integration - What kind of relevance does Supply Chain Management and vertical integration have for global businesses?

  How technology is changing competitive business landscape

Explain how technology is changing the competitive business landscape - Technology is an important component of the business environment.

  Describe the concept of software as a service

Software as a Service (SaaS) - Describe the concept of Software as a Service (SaaS), and describe at least one application area

  Discuss the evolution of information technology

Research, identify and discuss the evolution of Information Technology and the impact it has had on businesses

  Benefits of graphic design in a technical documentdescribe

benefits of graphic design in a technical documentdescribe some of the benefits of utilizing graphic design or visual

  Employee training and development - fransystemsyou have

employee training and development - fransystemsyou have just been hired as the training department of one for

  How a business should manage organizational change caused

how a business should manage organizational change caused by technologydescribe how a business should manage

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd