Submission requirements details: All work must be submitted on Moodle by the due date followed by the presentation in week 12. Reference sources must be cited in the text of the report, and listed...

1 answer below »
hello


Submission requirements details: All work must be submitted on Moodle by the due date followed by the presentation in week 12. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Harvard Anglia referencing style. Assessment topic: Security Planning Task Details: ABC company is specialized on selling sports products. The company’s main sales are through their e-commerce website, where customers can issue orders and pay online. ABC company can receive orders through the following lines of sales 1. Online e-commerce website 2. Phone calls 3. Email orders Then the sales team are responsible on checking those emails and orders, prepare them and the deliver them to customer 1. Currently ABC have two branches – one headquarters and one site branches 2. HQ contains the following – a) Email server b) Web Server that hosts the e-commerce site. c) Databases Server that includes the following databases i. Employee Database ii. Customer Database iii. Product Database iv. Orders Database 3. Figure below shows the entire topology ABC’s business got an exponential growth from the beginning of 2018. This steady growth also brought challenges for ABC. They have to secure the sensitive information of their employee; customer and the most important assets are the orders Database. Moreover, their employees receive many emails, and they have to filter the orders emails from other emails. ABC had no dedicated security team and therefore till now no security policy is in place. Recently, the governing body of ABC forms a security team and makes following two goals that they would like to achieve in six months – 1. Assessing the current risk of the entire organization 2. . Treat the Risk as much as possible Part A: Risk Identification In achieving the above two goals, you will do the followings – 1. Find at least five assets 2. Find at least two threats against each asset 3. Identify vulnerabilities for the assets Part B: Risk Assessment At the end of the risk identification process, you should have i) a prioritized list of assets and ii) a prioritized list of threats facing those assets and iii) Vulnerabilities of assets. At this point, create Threats-Vulnerabilities-Assets (TVA) worksheet. Also, calculate the risk rating of each of the five triplets out of 25 Part C: Risk Treatment In terms of Risk Treatment, for each of the five identified risk, state what basic strategy you will take. Justify for each decision. Also, Advise all possible protection mechanism and corresponding place of application.
Answered 1 days AfterMay 19, 2021

Answer To: Submission requirements details: All work must be submitted on Moodle by the due date followed by...

Shubham answered on May 20 2021
155 Votes
Part A: Risk Identification
Question 1
Securing sensitive information: It will help in ensuring that the information is secured and it will help in protecting the information.
Order Database: Order database includes the management for application and it includes the table on SQL server database.
Filter emails: Email fi
ltering is required for analysis of incoming emails and this will help in filtering spam.
Security policy: Security policy is defined for securing the system and it can help in addressing constraints on flow and functions. It will help in accessing external systems that include programs and access to data.
Receive emails: Email service will help in receiving the email by user.
Question 2
Securing sensitive information
· The risk includes accidental loss of the data
· The risk includes inside attacks that does not provide a verifiable level of assurance.
Order Database
· The threat includes stealing of sensitive data through the legitimate users using the infected devices.
· The security breach can involve theft of database backup tapes and disks.
Filter emails
· Attackers can take advantage of e-mail to deliver a variety of attacks to organizations through the use of malware.
· Email threats are a reality and it attempts to access both business and personal information.
Security policy
· The security threat includes malicious acts that aim to steal and corrupt data. It continues to evolve more sophisticated and it can create security threats.
· The insider can bypass security measures out of considered attempts to become more productive. It can delete the data and steal the data that can harm the business.
Receive emails
· The threat can help attackers deliver a variety of attacks to the organization with the use of malware. It includes worms, Trojan horses, spyware and viruses. The attack can result in malicious entity control over the server and workstation that can exploit vulnerabilities.
· Phishing and spam can send unwanted bulk email messages. It can disrupt users' productivity and it can be used as a distributed mechanism for malware. Phishing attacks can be done with the use of email attacks.
Question 3
Securing sensitive information
The vulnerability includes failure to remove the internal content from public content. It includes use of insecure configuration and it can result in failure of disabling of diagnostic features that can result in using tools for helping sensitive information (Gadgil et al. 2020).
Order Database
The database vulnerability can lack due care and it will exploit vulnerability for demonstrating the critical installation of security patches. It can steal the data that misuse the standard database feature.
Filter emails
The vulnerability is not considered and it is only requested with a SQL statement. The user cannot use it for obtaining the information and it processes updation, deletion and creation of objects.
Security policy
The security exposure can result in missing application patches and it can result in inappropriate active and installed services and applications (Prastiti, Rahmanita and Jazari, 2020). The vulnerability includes identification of the right application and system.
Receive emails...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here