Description
You are going to be performing a simulated Risk Assessment on Example Inc. Example Inc is a healthcare system which consists of 2 hospitals and 10 different clinics that serves 3 different cities. The administrative staff has their own building which is the headquarters for the business. Around 250 employees work remotely and there are over 5,000 employees total that work for Example Inc. Choose one of the 5 scenarios below to draft a report of: Systems assessment, risk calculation, business impact analysis, and risk prioritization.
Choose from one of the following weaknesses and apply it to Example Inc. Keep in mind any regulations that Example Inc may have to stay compliant with. There are 5 for a reason. No one on your team is to choose the same scenario unless you have more than 5 team members.
#1
Untrained Staff, outdated web server, all remote staff
#2
Cloud based systems only (no physical backups), no security staff or consulting security firms, Single shared credential for customer database.
#3
No active directory solution, each computer has only 1 login. Wireless network only at offices. Small building but powerful WAPs. No antivirus software. Windows XP laptops only. Uses Google suite for all business application.
#4
LAN implemented with legacy switches. Recovered from 2 previous attacks in which the attackers got in via a public facing employee login portal (they still have not changed this. No IR team brought in, they just rebooted the server that was housing the employee login portal web application.
#5
All records are paper files. Computers only used for word processing and accounting software but have other unnecessary services enabled (ftp, ssh, telnet. Staff trained very well in IT and IT security.
Assignment Submission
For each vulnerability identify 1 risk, how likely it is to happen using research, what the impact of the risk would be if it came to pass as well as at least 1 security control for that vulnerability.
Submit your document below. Ensure APA citations are used where applicable and ensure to state which set of vulnerabilities you chose.
these questions you should answer for the scenario what you chose
1 .Identify at least 1 risk
2.how likely it is to happen using research
3.what the impact of the risk would be if it came to pass
4.1 security control for that vulnerability.