diff_months: 10

BIT361 Security Management and Governance Assignment

Flat 50% Off Order New Solution
Added on: 2024-11-27 00:30:47
Order Code:
Question Task Id: 484724

BIT361 Security Management and Governance

Risk Management Worksheets

Contents

Worksheets. 1

The Information Asset Register. 1

Threats. 3

Classifying and Categorizing Assets. 4

Listing Assets in Order of Importance The Asset Priority Table (Weighted Factor Analysis Worksheet) 5

Threat, Vulnerability, Asset (TVA) Table (Short Version) 6

Threat, Vulnerability, Asset (TVA) Table (Long Version) 7

Priority Risk Table. 8

Common Terms and Formulas in Risk Management. 9

Definitions. 9

Formulas. 9

The Information Asset Register

This step should be done without prejudging the value of each asset; values will be assigned later in the process.


ID No.


Information Asset Name


Asset Type (People, Process, Network, Hardware, Software)


Data Classification (Secret, Confidential, Private, Public)


Department


Location


Retention


Threats ?


Eg. (0)


Web Server


Hardware


Private


Marketing


Head office


Security Disposal


DDOS


Hardware failure


1









2









3









4









5









6









7









8
































































Threats

A list like the one should be created for each information asset to document its vulnerability to each possible or likely attack.


Asset Name: ________________________ eg (Webserver)


Date Evaluated: ________________________


Evaluated By: __________________________


Threat


Possible Vunerability


Software Attacks


IP is vulnerable to denial-of-service attacks (DDOS).


Outsider IP fingerprinting activities can reveal sensitive


information unless suitable controls are implemented.



























Classifying and Categorizing Assets

Once the initial inventory is assembled, you must determine whether its asset categories are meaningful to the organizations risk management program.


System Name: ________________________


Date Evaluated: ________________________


Evaluated By: __________________________


Information Assets


Data Classification


Impact to Profitability


Classification 1:




















Classification 2:














Classification 3:














Notes:

Listing Assets in Order of Importance The Asset Priority Table (Weighted Factor Analysis Worksheet)


Table 1: Asset Priority Table (Weighted Factor Analysis Worksheet)


Information Assets


Criterion 1: Impact on __________


Criterion 2: Impact on __________


Criterion 2: Impact on __________


Weighted Score


Criterion weight (1100); must total 100






(Asset 1)






(Asset 2)






(Asset 3)






(Asset 4)






(Asset ..)






(Asset ..)






(Asset ..)






(Asset ..)






(Asset ..)






(Asset ..)






(Asset ..)





Threat, Vulnerability, Asset (TVA) Table (Short Version)


Table 2: Threat, Vulnerability, Asset (TVA) Table


Threats -v


Assets->



Asset 1 Name ___________


Asset 2 Name ___________


Asset 3 Name ___________


Asset 4 Name ___________


Threat 1 ________________






Threat 2 ________________






Threat 3 ________________






Threat 4 ________________






Threat ______________






Threat ______________





Threat, Vulnerability, Asset (TVA) Table (Long Version)


Table 2: Threat, Vulnerability, Asset (TVA) Table



Threats


Assets->



Asset 1 Name ___________


Asset 2 Name ___________


Asset 3 Name ___________


Asset 4 Name ___________


Threat 1 ________________






Threat 2 ________________






Threat 3 ________________






Threat 4 ________________






Threat ______________






Threat ______________






Threat ______________






Threat ______________
















Notes*

Priority Risk Table


Table 3: Risk.


Asset


Threat


Vulnerability


Vulnerability Likelihood


Impact


Priority



































































Common Terms and Formulas in Risk Management.

Definitions


Term


Definition


Annual Cost Of The Safeguard (ACS)


Annual cost of the safeguard (Control)


Annualised Loss Expectancy (ALE)


A comparative estimate of the losses (SLE) from successful attacks on an asset over one year.


ALE (precontrol)


ALE of the risk before the implementation of the control


ALE (postcontrol)


ALE examined after the control has been in place for a period of time


Annualized Rate Of Occurrence (ARO)


Indicates how often you expect a specific type of attack to occur.


Asset Value (AV)


Financial value or worth of each information asset


Cost-Benefit Analysis (CBA)


Determines whether the benefit from a control alternative is worth the associated cost of implementing and maintaining the control.


Exposure Factor (EF)


The percentage loss that would occur from a given vulnerability being exploited


Likelihood


The probability that a specific vulnerability will be exploited.


Single Loss Expectancy (SLE)


The calculated value associated with the most likely loss


from a single occurrence of a specific attack

Formulas

ALE = Single Loss Expectancy (SLE) x Annualized Rate of occurrence (ARO)

SLE = asset value (AV) x exposure factor (EF)

CBA = ALE (pre - control) ALE(post - control) ACS

  • Uploaded By : Akshita
  • Posted on : November 27th, 2024
  • Downloads : 0
  • Views : 151

Order New Solution

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more