Free

Risk Assessment Scenario - Essay Example

Comments (0) Cite this document
Summary
Risk Assessment Scenario Samson Akhigbe CJA/520 July 13, 2011 Abstract Being the director of security for a computer software company, one has to detect any forms of intrusion and determine the risks of any illegal physical or internet intrusion into the database…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Risk Assessment Scenario
Read TextPreview

Extract of sample "Risk Assessment Scenario"

Risk Assessment Scenario Samson Akhigbe CJA/520 July 13, Being the director of security for a computer software company, one has to detect any forms of intrusion and determine the risks of any illegal physical or internet intrusion into the database. Intrusion detection is the process of identifying activities that would attack and destroy the company’s confidentiality of data, resources and information. Illegal physical intrusion is where a person who isn’t authorized to access the company’s system breaks in physically to the system where resources, information or data is kept (Haas, 2011). Once the intrusion is successfully completed the intruder then can have the company’s administration’s privileges and use it to attack the company that would cost them thousand’s of dollars because once the physical intrusion is made, the company’s operation will then be interrupted and disturbed because there is a very high probability that their resources, information and data will be corrupted which will lead to the ineffectiveness and inefficiency of the company’s operation. It would also cause the company to have a bad reputation because once the public will know that the company’s confidential information was intruded it will give them a negative image that they do not have a tight security system, allowing investors and clients to feel unsafe under the company’s supervision which would also lead to sales depreciation. As the director of security I have to implement the Perimeter Intrusion Detection System (PIDS) to prevent these consequences from happening. PIDS is a system used in maximum – security areas such as airports, detention centers, nuclear facilities and more to prevent the intrusion of unauthorized personnel. There are four basic elements in PIDS and these are: Sensors, Video Detection Equipment, Threat Assessment and Alarm Correlation/Management System and Data Communication Systems. Barrier, Volumetric and Fence Mounted sensors are types of sensors that would detect intruder’s motion in a secured area that would create a physical barrier for the intruder in a form of a wire system and would detect vibrations caused by climbing or cutting of objects in secured areas. Video detection equipment such as cameras is necessary in PIDS because it would detect and capture possible threats such as intruders, vehicles and packages. Once threat is detected by the video operator they will automatically sound the alarm so that immediate action would be taken. The video footage will also serve as reference to any threat analysis in the future. Threat Assessment and Alarm Correlation/Management System will alert and alarm the operators once intrusion or unauthorized change of state has occurred. The alarm will activate once the secured area and the perimeter is breached so that immediate action can be done. The Data Communication System is the most critical infrastructure of PIDS because this provides conjunction between the sensors, video detection equipment and the alarm management system. The Data Communication System must be 99.999% reliable because once this infrastructure fails; all the other instruments such as sensors, video detection equipment and alarm management system will be useless because these instruments are linked to the data communication system which is the command center of these instruments (“Perimeter Intrusion,” n.d.). Internet intrusion is where an attacker or an intruder gains access to the company’s confidential resources, information and data through the use of the internet or through the network of the company. Large and small companies operate a website for faster and efficient transactions. These websites allows companies to attract investors, clients and develop a wider market. These websites will also allow the company to market and advertise their products worldwide in a less expensive manner. And in order to advertise their products and transact with their clients the company has to provide their information to the public, such as email addresses, bank account numbers and other necessary information. Clients on the other hand will also have to provide their information in order to complete the transactions such as credit card numbers, email addresses, cell phone numbers and etc. And giving out this kind of confidential information on the internet will attract attackers and intruders to get hold of this information to gain access in people’s personal and business accounts to use in their advantage. Once this intrusion is successfully completed it will create interruption to the company because it can destroy the system, there will be interception because there was an unauthorized access to the system and it will compromise the data and transactions made because the system can be modified by the attacker once the system has been intruded. As stated above this will also cost the company and its clients thousand’s of dollars and the company’s reputation would be at stake if this happens. In order to prevent this intrusion, as the director of security, I have to implement the Agent – based Monitoring, Intrusion Detection and Response System (AMIDAR). The AMIDAR system provides security services that will prevent internet or network - based intrusion. The AMIDAR system will monitor the IP packets traveling; it will monitor the server’s log entries online, it will monitor the log generated by the firewalls and it will monitor the behavior of the router. Monitoring the IP packets traveling in the network will allow AMIDAR to detect and respond to network – based attack. Monitoring the servers log entries online will allow AMIDAR to detect and respond to host – based attacks. Monitoring the log generated by the firewall will allow AMIDAR to look for suspicious activities in the network. And monitoring the behavior of the router will allow AMIDAR to detect and respond to attacks targeted at it (Ting, Hwee, Tai, Yong, n.d.). As the director of security I have to implement the PIDS and AMIDAR system in order to prevent illegal physical and internet or network – based intrusion from happening. PIDS is the system used by maximum – security areas to protect and secure the perimeter of high - risk establishments. And AMIDAR is the best system to be used in preventing internet or network – based intrusion because of its complex and diverse methods of detecting and identifying activities that would attack and destroy the company’s database. Once this intrusion is prevented it will allow the company to have a safe and efficient operation allowing the company to generate profit and sales. Reference Page Ting,C.,Hwee,O.,Tai,T.,Yong,N. (n.d.). Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business Retrieved from http://www.raid-symposium.org/raid99/PAPERS/Ting.pdf Anderson,A. (2011). Illegal Physical and Internet Intrusion to the Database. Retrieved from http://www.angelanderson.com/illegal-physical-and-internet-intrusion-to-the-database/ FUJITSU. (n.d.). Perimeter Intrusion Detection System (PIDS). Retrieved from http://www.fujitsu.com/downloads/TEL/fnc/whitepapers/Atrica_PIDS.pdf Haas,J. (2011) Intrusion. Retrieved from http://linux.about.com/cs/linux101/g/intrusion.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risk Assessment Scenario Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/law/1428167-scenario-thinking-and-risk
(Risk Assessment Scenario Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/law/1428167-scenario-thinking-and-risk.
“Risk Assessment Scenario Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/law/1428167-scenario-thinking-and-risk.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Risk Assessment Scenario

Risk Assessment

...?Risk Assessment The following paper is based on the given case studies of Colleen M. and Xander L. The paper assesses the risk in the both case studies and compares them accordingly. In addition to this, requirement of additional information and potential correctional strategy for these case studies are also suggested. As the paper is all about risk assessment hence understanding of this concept is foremost requirement. Risk assessment is part of risk management in which level of risk in a particular event or place is calculated. It can be quantitative and qualitative....
3 Pages(750 words)Essay

Risk assessment

...? Medical Malpractice Medical risks are a potential occurrence whenever medical team engage in any given treatment procedures. The doctors usually inform their patients of the possibility of an unfavourable outcome concerning them, during treatment. However, these risks are not always accidental, as most people may want to believe. In some cases, the medical staffs are responsible for some of these medical malpractices (Fabre 2008, p. 10). For instance, in the hospital I have been working for some time, I had such dreaded experiences in my area of specialization, obstetric department. I had been part of the team presiding over the delivery procedure for a young mother in her late twenties. According to...
6 Pages(1500 words)Essay

Risk Assessment

...?  Risk Assessment Risk Assessment So as to create an environment that is safe for everyone, a number of factors should be taken into account. The first step includes taking a threat assessment whereas the hazard or threat is ascertained, outlined, and quantified. In a situation involving terrorism, the threat is the individuals or groups of people that are present. They have the ability and a past of expressing purpose for using actions that are perceived as hostile. Sometimes, they use actual procedures that are hostile against potential targets. The history and ability of terrorists involves any method they have utilized to accomplish their objectives....
9 Pages(2250 words)Essay

RISK ASSESSMENT

.... Furthermore, GDI also has certain number of information technology based resources along with heavy and light vehicles which also act as an asset for the organization. The existing employees can also be termed as the tangible assets for GDI this is because with the assistances and performances of the employees the organization earns profits and growth as well as sustainability. Along with the employees, the prevailing shares of GDI also act as an asset for the organization. Assessment of the Organizational Risks From the presented scenario, it is derived that the CEO of GDI Jamie Pierce decided to take certain measures for reducing the operational cost of the organization by lowering...
5 Pages(1250 words)Term Paper

Risk Assessment

...? Malathion Risk Assessment Malathion Risk Assessment This report assesses the risk to Genericville regarding the application of Malathion as a preventative and precautionary measure to control the mosquito population; and , therefore, control the spread of West Nile Virus (WNV). This report will address the following conditions: 1. Hazard identification 2. Dose-response 3. Exposure 4. Risk characterization From these data, the report will recommend a course of action regarding the relative risks of using Malathion and no application. Hazard Identification Malathion, according to the Environmental...
3 Pages(750 words)Research Proposal

Clinical Reasoning Assessment Scenario

...interventions should be conducted in a way that will achieve these goals. It is also important that infection be avoided for the patient’s well-being. Aside from addressing pain, the attending nurse should also address the return of quality life for the patient. Reference: Arozullah AM, Daley J, Henderson WG, Khuri SF. 2000. Multifactorial risk index for predicting postoperative respiratory failure in men after major noncardiac surgery. The National Veterans Administration Surgical Quality Improvement Program. Ann Surg 2000; 232:242–253. The Acute Respiratory Distress Syndrome Network. 2000. N Engl J Med 2000; 342:1301–1308. Bardsley MJ, Venables CW, Watson J, Goodfellow J, Wright PD. Evidence for validity of a health...
8 Pages(2000 words)Essay

Risk Assessment

...in degree. For instance, a hazard might has a relative low risk but with a high outrage risk. This is the scenario that happened after Exxon Valdez disaster in Alaska in 1989, an oil spill disaster. A BP oil tanker spilled a smaller amount of oil off the cost of California (low hazard risk) but since the public realized that Exxon erred by not providing quickly, timely, and honest information about the spill, the public viewed the same scenario as equally disastrous as the Exxon disaster and the public’s level of outrage became high (Walaski, 2011, 32). In case like this, outrage management is necessary and public must be calm down by sincere listening,...
2 Pages(500 words)Essay

Risk assessment

...RISK ASSESSMENT of Affiliation RISK ASSESSMENT As Roger M. Cooke may argue out, the concept of risk management traces its roots to the ancient Egypt. The Nile River could flood the nearby land for around thirty years in succession, which was then followed by a 2 year dry spell that resulted in the failure of all crops in the field. If only the Egyptians had knowledge of exactly when the Nile will fail to flood, then they would not have needed writing, calculations, surveying or geometry. In other words, early civilization basically was a product of the desire to manage risks (Cooke, 2009). For ancient Egyptians, in addition to...
2 Pages(500 words)Assignment

Risk Assessment

...Risk Assessment By INTRODUCTION The management of Hewlett-Packard undertook this risk assessment to meet the requirement of risk management ISO 27005 in order to perform an extensive assessment of the system. An assessment will also be effective in ensuring that all the investments of the company are safe and would guarantee the company of success and improvement in its performance within the market. Thus, a rise in the improvement and efficiency of an organisation’s operation within the company (Bostrom et al., 2008 p 56). The management also had to ensure that the various operations within its offices are safe and no...
30 Pages(7500 words)Essay

Risk Assessment

...and an estimated loss of $1, 000,000 was recorded in addition to customer confidence. In this study, I am going to undertake risk assessment based on GFI network diagram. Knowledge of the vulnerabilities existing in the network will facilitate the design of a solution to counter the threats. Company network description Risk assessment on the GFI Inc. network Risk assessment will be conducted ion GFI network to establish the likely areas of failure. Risk assessment will focus on managerial, operational and technical aspects that are prone to vulnerabilities and which can be exploited by attackers. Once...
10 Pages(2500 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Risk Assessment Scenario for FREE!

Contact Us