StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk Assessment Scenario - Essay Example

Cite this document
Summary
Risk Assessment Scenario Samson Akhigbe CJA/520 July 13, 2011 Abstract Being the director of security for a computer software company, one has to detect any forms of intrusion and determine the risks of any illegal physical or internet intrusion into the database…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Risk Assessment Scenario
Read Text Preview

Extract of sample "Risk Assessment Scenario"

Risk Assessment Scenario Samson Akhigbe CJA/520 July 13, Being the director of security for a computer software company, one has to detect any forms of intrusion and determine the risks of any illegal physical or internet intrusion into the database. Intrusion detection is the process of identifying activities that would attack and destroy the company’s confidentiality of data, resources and information. Illegal physical intrusion is where a person who isn’t authorized to access the company’s system breaks in physically to the system where resources, information or data is kept (Haas, 2011).

Once the intrusion is successfully completed the intruder then can have the company’s administration’s privileges and use it to attack the company that would cost them thousand’s of dollars because once the physical intrusion is made, the company’s operation will then be interrupted and disturbed because there is a very high probability that their resources, information and data will be corrupted which will lead to the ineffectiveness and inefficiency of the company’s operation. It would also cause the company to have a bad reputation because once the public will know that the company’s confidential information was intruded it will give them a negative image that they do not have a tight security system, allowing investors and clients to feel unsafe under the company’s supervision which would also lead to sales depreciation.

As the director of security I have to implement the Perimeter Intrusion Detection System (PIDS) to prevent these consequences from happening. PIDS is a system used in maximum – security areas such as airports, detention centers, nuclear facilities and more to prevent the intrusion of unauthorized personnel. There are four basic elements in PIDS and these are: Sensors, Video Detection Equipment, Threat Assessment and Alarm Correlation/Management System and Data Communication Systems. Barrier, Volumetric and Fence Mounted sensors are types of sensors that would detect intruder’s motion in a secured area that would create a physical barrier for the intruder in a form of a wire system and would detect vibrations caused by climbing or cutting of objects in secured areas.

Video detection equipment such as cameras is necessary in PIDS because it would detect and capture possible threats such as intruders, vehicles and packages. Once threat is detected by the video operator they will automatically sound the alarm so that immediate action would be taken. The video footage will also serve as reference to any threat analysis in the future. Threat Assessment and Alarm Correlation/Management System will alert and alarm the operators once intrusion or unauthorized change of state has occurred.

The alarm will activate once the secured area and the perimeter is breached so that immediate action can be done. The Data Communication System is the most critical infrastructure of PIDS because this provides conjunction between the sensors, video detection equipment and the alarm management system. The Data Communication System must be 99.999% reliable because once this infrastructure fails; all the other instruments such as sensors, video detection equipment and alarm management system will be useless because these instruments are linked to the data communication system which is the command center of these instruments (“Perimeter Intrusion,” n.d.).

Internet intrusion is where an attacker or an intruder gains access to the company’s confidential resources, information and data through the use of the internet or through the network of the company. Large and small companies operate a website for faster and efficient transactions. These websites allows companies to attract investors, clients and develop a wider market. These websites will also allow the company to market and advertise their products worldwide in a less expensive manner. And in order to advertise their products and transact with their clients the company has to provide their information to the public, such as email addresses, bank account numbers and other necessary information.

Clients on the other hand will also have to provide their information in order to complete the transactions such as credit card numbers, email addresses, cell phone numbers and etc. And giving out this kind of confidential information on the internet will attract attackers and intruders to get hold of this information to gain access in people’s personal and business accounts to use in their advantage. Once this intrusion is successfully completed it will create interruption to the company because it can destroy the system, there will be interception because there was an unauthorized access to the system and it will compromise the data and transactions made because the system can be modified by the attacker once the system has been intruded.

As stated above this will also cost the company and its clients thousand’s of dollars and the company’s reputation would be at stake if this happens. In order to prevent this intrusion, as the director of security, I have to implement the Agent – based Monitoring, Intrusion Detection and Response System (AMIDAR). The AMIDAR system provides security services that will prevent internet or network - based intrusion. The AMIDAR system will monitor the IP packets traveling; it will monitor the server’s log entries online, it will monitor the log generated by the firewalls and it will monitor the behavior of the router.

Monitoring the IP packets traveling in the network will allow AMIDAR to detect and respond to network – based attack. Monitoring the servers log entries online will allow AMIDAR to detect and respond to host – based attacks. Monitoring the log generated by the firewall will allow AMIDAR to look for suspicious activities in the network. And monitoring the behavior of the router will allow AMIDAR to detect and respond to attacks targeted at it (Ting, Hwee, Tai, Yong, n.d.). As the director of security I have to implement the PIDS and AMIDAR system in order to prevent illegal physical and internet or network – based intrusion from happening.

PIDS is the system used by maximum – security areas to protect and secure the perimeter of high - risk establishments. And AMIDAR is the best system to be used in preventing internet or network – based intrusion because of its complex and diverse methods of detecting and identifying activities that would attack and destroy the company’s database. Once this intrusion is prevented it will allow the company to have a safe and efficient operation allowing the company to generate profit and sales.

Reference Page Ting,C.,Hwee,O.,Tai,T.,Yong,N. (n.d.). Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business Retrieved from http://www.raid-symposium.org/raid99/PAPERS/Ting.pdf Anderson,A. (2011). Illegal Physical and Internet Intrusion to the Database. Retrieved from http://www.angelanderson.com/illegal-physical-and-internet-intrusion-to-the-database/ FUJITSU. (n.d.). Perimeter Intrusion Detection System (PIDS). Retrieved from http://www.fujitsu.com/downloads/TEL/fnc/whitepapers/Atrica_PIDS.

pdf Haas,J. (2011) Intrusion. Retrieved from http://linux.about.com/cs/linux101/g/intrusion.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risk Assessment Scenario Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/law/1428167-scenario-thinking-and-risk
(Risk Assessment Scenario Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/law/1428167-scenario-thinking-and-risk.
“Risk Assessment Scenario Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/law/1428167-scenario-thinking-and-risk.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk Assessment Scenario

The Potential Hazards and Risk Posed by the Hazards

To tackle this scenario they have to be preparing themselves to tackle any kind of situation and also to save precious lives as much as they can.... Then they look to save property which can be saved after any hazard like scenario, they generally don't risk their lives while saving the properties... Due to present day modernisation and vibrant culture among the youths of every country, the need for preparing a stable and flexible risk management plan is at the highest… Accommodation centres of students are a prime target for fire related hazards....
10 Pages (2500 words) Essay

Risk Assessment

risk assessment is the process of estimating the probability of a risk, comparing it with other risks probability and establishing priorities for avoiding or managing risks.... In addition, risk assessment also involves the identification of a hazard (Spoolman & Miller, 2011, 428).... hellip; According to Spoolman & Miller (2011), a risk is the probability of suffering harm from a hazard that can cause injury, disease, death, economic loss or damage and is usually expressed as a mathematical risk assessment The essay aims to address a two-fold objective to wit to differentiate hazard, risk,and outrage; and (2) to give an example of low hazard risk but with a high outrage risk....
2 Pages (500 words) Essay

: RISK ASSESSMENTS OF SHIP COLLISIONS IN HIGH-TRAFFIC MARINE TERRITORY

It can be applied in the risk assessment for ship collisions with floating objects, bridge or quay.... risk assessment helps in prior identification of the various sources of failure that have the highest possibility of resulting into ship collisions.... The process of risk assessment is a comprehensive procedure that encompasses detailed analysis of the various components of the ship as well as the human and environmental factors.... risk assessment and prediction in high marine territories could help in minimizing the occurrence of such collisions hence help save millions of lives put in danger by such incidents....
1 Pages (250 words) Research Paper

Risk Management in Preventing Disasters: The UK Intelligent Networks

The purpose of this paper "risk Management in Preventing Disasters: The UK Intelligent Networks" is to evaluate the concept of intelligent networks as a tool for preventing potential terroristic attacks proposed by Great Britain.... Additionally, the paper discusses the risk management cycle....
12 Pages (3000 words) Research Paper

Capability of the Established Emergency Management Strategies in Sweden

nbsp;The Swedish National risk assessment 2012 constitutes a process that collectively develops an extensive and method to prevent and manage diverse events within the scope of operations.... The Swedish National risk assessment 2012 constitutes a process that collectively develops an extensive and method to prevent and manage diverse events within the scope of operations (National Risk Register of Civil Emergencies, 2015, 38).... The report that is a national risk assessment carried out in 2011 identifies most of the common risks in the region with an attempt to reduce such risks through the determination of their likelihood....
8 Pages (2000 words) Case Study

Hazard and Risk Management in Sweden

It is from such background the Swedish government commissioned the Swedish Civil Contingencies Agency (MSB) to continue producing the national risk assessment, which commenced in 2011.... The major document that resulted from the commission is the Swedish National risk assessment in 2012, which constitutes the procedures required to develop collectively method of preventing and managing several risks within different scopes of operations (National Risk Register of Civil Emergencies 2015, 28)....
7 Pages (1750 words) Case Study

Environmental Investigation: the National Risk Register and the National Risk Profile Documents

The assessment is based on the judgment of the expertise and interpretation of data.... The assessment was quantified depending on the scale of risks to human life, the emerging emergencies, and the newly identified risks.... Strengths and Weaknesses of the assessment and Qualification by NRP Strengths NRP work in collaboration with DEMA, government agencies, and other organizations to in the description, evaluation and assessment of the netlist thus providing guidelines, statistics and advice NRP is keen in establishing the results of the assessed risks in a descriptive manner based on real incidents in history instead of the application of fictions scenarios....
9 Pages (2250 words) Term Paper

Risk Assessment for Sultan Qaboos Mosque Construction

This report "risk assessment for Sultan Qaboos Mosque Construction" analyzes Sultan Qaboos Mosque construction from the perspective of health and safety and risk assessment.... Duty Holder's risk Assessments2.... The Appropriateness of the Methodology UsedNumerous methodologies and tools exist that can be used to understand the nature of the risk and the complexity of the risk (Pinto, Nunes and Ribeiro, 2011; Zhou, Whyte, and Sacks, 2012)....
21 Pages (5250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us