Microsoft Word - CMP71001_Assignment_1_2019 S31-Final Unit code CMP71001 Assignment 1 Risk assessment. Due Date Learning Outcomes Graduate 7th Dec XXXXXXXXXX00pm (QLD Time) 1, 2 Attributes 3, 4 & 5...

1 answer below »

View more »
Answered Same DayDec 02, 2021CMP71001Southern Cross University

Answer To: Microsoft Word - CMP71001_Assignment_1_2019 S31-Final Unit code CMP71001 Assignment 1 Risk...

Nextgen answered on Dec 05 2021
162 Votes
RISK ASSESSMENT
Table of Content
1. Introduction    4
2. Task-1    4
2.1 Risk assessment concept in the cyber security context    4
2.1.1 Risk assessment definition    4
2.1.2 Essence of the risk assessment process and the objectives    4
2.2 Knowledge identification    5
2.2.1 Five different points’ indications    5
2.3 Risk assessment result application    5
2.3.1 Develop the cyber security management    6
2.3.2 Impact of risk assessment result on the business decision-making process    6
2.4 Risk assessment approach limitations    6
2.4.1 Limitations of the qualitative risk assessment approach    6
2.4.2 Limitations of the quantitative risk asse
ssment approach    7
3. Task-2    7
3.1 Question identifications    7
3.1.1 Analysis of five questions for identifying the critical assets    7
3.1.2 The reason behind the identification of the critical assets    7
3.2 WFA worksheet for ranking the assets    7
3.2.1 Three matched criteria with the context    7
3.2.2 Importance of these criteria    8
3.2.3 Justifications of the impacting factors    8
4. Task-3    9
4.1 Threats to Information assets    9
4.1.1 Identify five threats    9
4.1.2 Significant discussions about these threats    9
4.1.3 Reasons behind treating these threats as critical    10
5. Task-4    10
5.1 Risk impact analysis    10
5.1.1 Risks ranking    10
5.1.2 Justifications of the risk mappings    11
6. Conclusion    11
7. Reference list    12
1. Introduction
Cyber-security protects the computer systems and networks from being disruption. Fleet Space Technologies connects the IoT across the world and uses a major fleet for low-cost satellites. As a cyber-security consultant, cyber security program is selected to develop the IoTs of Fleet Space Technologies. Fleet Space Technologies is the largest capital raising history to launch 10 nano-satellites for boosting the user infrastructure.
2. Task-1
2.1 Risk assessment concept in the cyber security context
Risk assessment is important to identify, estimate, resolve risks associated with the information of Things within Fleet Space Technologies, for preventing the systems from being damaged and misled. Risk scanning implements the risk consequences for initializing the associated risk factors with Fleet Space Technologies (Fleet.Space, 2019).
2.1.1 Risk assessment definition
Risk assessment identifies the different information assets that impact on the entire business entities of Fleet Space Technologies. Fleet Space Technologies depends on information systems and information technology for conducting business. Online computing is one of the classes in information systems, which can facilitate and manage applications that are transaction oriented and used for data entry as well as retrieval of transaction processing on database management system. It has been defined that online transaction system as the capturing of transaction as well as event information utilizing technology in order to process the information as per the business rules. On the other hand, globalization and internet has transformed aspects of life through providing several features and functionalities in new systems that includes online transaction systems. Risk assessment is considered as the fairly technological concept that is performed an assessment literally to estimate the encountered risks by Fleet Space Technologies. Risk assessment minutiae both the external and internal vulnerabilities and the likelihood of these vulnerable exploitations (Macher et al., 2016).
2.1.2 Essence of the risk assessment process and the objectives
Expert guidance leads to the risk assessment process in a successful track through proper planning and specialist knowledge inclination. Fleet Space Technologies continuously monitors the risk environments for detecting the business estimation changes and maintaining the complete overview of the risk assessment process. Risk assessment process mitigates the risks by establishing certain cyber security criteria. Continuous risk management produces valid consistent that retains the risk ranking and documentation (Macher et al., 2016). The lack of data integrity, data confidentiality and data availability associate the risks with the IoTs of Fleet Space Technologies. The objectives of risk assessment are to provide information and cyber security guidelines for Fleet Space Technologies and also demonstrate the compiled requirements.
2.2 Knowledge identification
Risk assessment provides a thorough knowledge of the intensity and dimensions of identified risks. The impact of the identified risks is focused on the objectives of the business of Fleet Space Technologies.
2.2.1 Five different points’ indications
The objectives of risk assessments highlight the business appraisals that wisely assist to develop the knowledge regarding risk assessment and its importance. There mentioned five different indication points that spotlight the risk assessment objectives.
· Hazard evaluation- Risk assessment provides the knowledge to minimize the impact of hazards that negatively affect the information systems of Fleet Space Technologies.
· Harmful consequences identification- Risk assessment identifies the harmful consequences associated with Fleet Space Technologies that provides a thorough knowledge about reviewing the risk assessment routine for identifying the culprits,
· Uncertainty identification- Future has no certainty and the profit margin of Fleet Space Technologies can be disrupted anytime due to the continuous involvements of risks. It provides the top management of Fleet Space Technologies to fight against the uncertainty by appropriately identifying the risks (Thuraisingham et al., 2016, July).
· Risk ranking- Risk assessment arranges the risk based on the highest occurrence likelihood that provides knowledge about the dimensions of the risks. Risk calculator calculates the risk intensity and the most relevant risk deduction approach.
· Risk mitigation- Risk mitigation lessens the risk by maintaining risk assessment strategy that prepares potential risk documentation for Fleet Space Technologies (Baikalov et al., 2016).
2.3 Risk assessment result application
Risk assessment result summarizes the risk assessment process and evaluates the associated risks. This result has effectiveness while applying it to develop cyber security systems. Fleet Space...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30