PCS 3 all versions - Copy
docx
keyboard_arrow_up
School
Griffith University *
*We aren’t endorsed by this school
Course
3208AFE
Subject
Management
Date
Nov 24, 2024
Type
docx
Pages
13
Uploaded by CheiFNaviGator
Chapter 6
Question Number 1
Version 1:
For an organization conducting risk management assessments on three distinct information
assets, as described in the data below, we need to determine which vulnerability should be
assessed for additional controls first and which one should be assessed last:
1.
Switch 147
is responsible for connecting a network to the Internet. It has two
vulnerabilities:
Susceptibility to hardware failure (Likelihood: 2)
Susceptibility to an SNMP buffer overflow attack (Likelihood: 1)
2.
Server WebSrv6
is responsible for hosting the company's website and facilitating e-
commerce transactions. It's vulnerable to attacks via invalid Unicode values with a
likelihood of 3.
3.
Operators use
Control Console MGMT45
to monitor server room operations. This
console lacks passwords and is susceptible to unlogged misuse by operators, with a
likelihood of 2.
Prioritization for Additional Controls:
Server WebSrv6:
This should be evaluated for additional controls first. The
likelihood of attacks via invalid Unicode values is moderately high (Likelihood: 3),
and this vulnerability can significantly impact the organization's web presence and e-
commerce transactions.
Control Console MGMT45:
Next, assess the vulnerability of unlogged misuse by
operators on the Control Console MGMT45. While the likelihood is moderate
(Likelihood: 2), it's still more likely to be exploited than the vulnerability in Switch
147.
Switch 147:
Evaluate the vulnerability of susceptibility to an SNMP buffer overflow
attack last. Although it's important, the likelihood is the lowest among the three
vulnerabilities (Likelihood: 1).
Version 2:
In the context of risk management for an organization's three information assets, we aim to
identify which vulnerability should be prioritized for additional controls and which one
should be considered last:
1.
Switch 147
serves as the connection between the network and the Internet. It faces
two vulnerabilities:
Susceptibility to hardware failure (Likelihood: 2)
Susceptibility to an SNMP buffer overflow attack (Likelihood: 1)
2.
Server WebSrv6
hosts the company's website and manages e-commerce transactions.
It's susceptible to attacks via invalid Unicode values, with a likelihood rating of 3.
3.
Operators utilize the
Control Console MGMT45
for monitoring server room
operations. This console lacks passwords and is susceptible to unlogged misuse by
operators, with a likelihood of 2.
Prioritization for Additional Controls:
Server WebSrv6:
Begin with this vulnerability, which is vulnerable to attacks via
invalid Unicode values. With a moderate likelihood (Likelihood: 3), it poses a
significant risk to the organization's web services and transactions.
Control Console MGMT45:
Assess the vulnerability of unlogged misuse by
operators on the Control Console MGMT45 next. Although the likelihood is moderate
(Likelihood: 2), it's more likely to be exploited compared to the vulnerability in
Switch 147.
Switch 147:
Evaluate the vulnerability related to susceptibility to an SNMP buffer
overflow attack last, as it has the lowest likelihood (Likelihood: 1) among the three
vulnerabilities.
Version 3:
For risk management purposes within an organization, we need to determine the order in
which vulnerabilities should be assessed for additional controls - which one should be
addressed first and which should be addressed last, considering the following information
assets:
1.
Switch 147
facilitates the network's connection to the Internet and exhibits two
vulnerabilities:
Susceptibility to hardware failure (Likelihood: 2)
Susceptibility to an SNMP buffer overflow attack (Likelihood: 1)
2.
Server WebSrv6
plays a critical role in hosting the company's website and
conducting e-commerce transactions. It's vulnerable to attacks via invalid Unicode
values, with a likelihood rating of 3.
3.
The
Control Console MGMT45
is employed by operators for monitoring server
room operations. This console is deficient in password protection and is susceptible to
unlogged misuse by operators, with a likelihood of 2.
Prioritization for Additional Controls:
Server WebSrv6:
Start by assessing this vulnerability, which is vulnerable to attacks
via invalid Unicode values. It carries a moderate likelihood (Likelihood: 3) and can
significantly impact the organization's online services and transactions.
Control Console MGMT45:
Next, evaluate the vulnerability related to unlogged
misuse by operators on the Control Console MGMT45. Although the likelihood is
moderate (Likelihood: 2), it's more likely to be exploited compared to the
vulnerability in Switch 147.
Switch 147:
Finally, assess the vulnerability concerning susceptibility to an SNMP
buffer overflow attack last, as it has the lowest likelihood (Likelihood: 1) among the
three vulnerabilities.
Question Number 3
Version 1:
In Chapter 6, the list of threats to InfoSec was outlined, but there are additional threats worth
considering. Firstly, we have the threat of "Insider Espionage." While the chapter discussed
insider threats, it didn't delve into the specific danger of employees or contractors
intentionally spying for external entities. This threat can be particularly damaging, as insiders
have access to sensitive data and may misuse it for financial gain or espionage purposes.
Secondly, we have the threat of "Supply Chain Compromises." Although the chapter touched
on third-party risks, it didn't emphasize the potential dangers of compromised suppliers. An
attacker infiltrating a supplier's systems could inject malicious code into products or services,
leading to widespread vulnerabilities in the supply chain.
Lastly, the chapter didn't address the threat of "Emerging Technologies." With the rapid
evolution of technology, new threats are constantly emerging. For example, the rise of
quantum computing poses a threat to encryption methods used to secure data today. This
evolving landscape requires InfoSec professionals to stay vigilant and adapt to emerging
threats proactively.
Version 2:
While Chapter 6 highlighted several InfoSec threats, it missed some crucial ones that merit
attention. One such threat is "Social Engineering through Social Media." Although social
engineering was discussed, the chapter didn't explore how attackers leverage information
from social media platforms to manipulate individuals or organizations. Hackers can use
seemingly innocuous details shared on social media to craft convincing phishing attacks or
gain unauthorized access.
Another underemphasized threat is "Physical Security Breaches." While the chapter mainly
focused on digital threats, physical security is equally important. Unauthorized access to data
centers or offices can lead to data theft or infrastructure damage, and this wasn't covered
extensively in the chapter.
Lastly, "Disaster-Related Threats" were not thoroughly addressed. Natural disasters, such as
earthquakes or floods, can disrupt InfoSec systems. Additionally, the potential for
cyberattacks during or after such events wasn't explored in detail. Organizations need to have
robust disaster recovery plans that encompass InfoSec to mitigate these risks effectively.
Version 3:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
In Chapter 6, several InfoSec threats were discussed, but some were overlooked. One
significant omission is "Malicious Insider Collaborations." While insider threats were
mentioned, the chapter didn't delve into the danger of multiple insiders colluding to breach
security. Such collaborations can be harder to detect and can result in more severe breaches
due to the combined knowledge and access of the insiders involved.
Another missed threat is "Third-Party Vendor Negligence." Although third-party risks were
acknowledged, the chapter didn't explore the risk of vendors not adequately safeguarding
shared data. Vendors may have weaker security measures, making them attractive targets for
attackers seeking entry into an organization's network.
Lastly, the chapter didn't address "Zero-Day Vulnerabilities" explicitly. These are undisclosed
software vulnerabilities that hackers can exploit before developers release patches. The
rapidly changing threat landscape requires InfoSec professionals to stay vigilant for zero-day
threats that could be used against their systems.
Question Number 5
Version 1:
To perform a preliminary risk assessment using the asset valuation method, apply it to the
information stored in your home. Begin by gauging the financial worth of critical documents
like property deeds, vehicle titles, and legal contracts. Calculate the cost of replacing these
items. Next, assess the sentimental value of family photos, home videos, and personal
mementos; these items may not have a direct monetary value but hold immense emotional
importance. Finally, consider the financial impact of losing financial records like tax returns,
investment portfolios, and loan agreements. These three dimensions of valuation provide a
holistic understanding of the data's significance.
Version 2:
When employing the asset valuation method for a preliminary risk assessment of your home's
information, you must evaluate its various aspects. Firstly, assess the monetary value by
calculating the cost of replacing vital documents such as identification cards, deeds, and
insurance policies. Secondly, delve into the sentimental value of irreplaceable items like
family photos, heirlooms, and handwritten letters; these items may not have a price tag, but
their loss can be emotionally devastating. Lastly, consider the financial implications of losing
critical records like tax documents, investment portfolios, and loan agreements. By
addressing these valuation questions, you gain a more comprehensive understanding of the
importance of the data in your home.
Version 3:
To conduct a preliminary risk assessment using the asset valuation method, apply it to the
information within your home. Begin by evaluating the financial worth of essential
documents such as property titles, legal contracts, and insurance policies. Calculate the
replacement cost for these items. Next, reflect on the sentimental value of family
photographs, home videos, and personal keepsakes. While these items may lack a specific
monetary value, their loss could be emotionally devastating. Lastly, consider the financial
consequences of losing critical financial records like tax returns, investment portfolios, and
loan agreements. These valuation questions offer a multifaceted view of the significance of
the data in your home.
Chapter 7
Question Number 1
Version 1:
Threat Category
SLE
ARO
ALE
Programmer Mistakes
$5,000
1 per week
$5,000 x 52 weeks = $260,000
Loss of Intellectual Property
$75,000
1 per year
$75,000 x 1 = $75,000
Software Piracy
$500
1 per week
$500 x 52 weeks = $26,000
Theft of Information (Hacker)
$2,500
1 per quarter
$2,500 x 4 = $10,000
Theft of Information (Employee)
$5,000
1 per 6 months
$5,000 x 2 = $10,000
Web Defacement
$500
1 per month
$500 x 12 months = $6,000
Theft of Equipment
$5,000
1 per year
$5,000 x 1 = $5,000
Virus, Worms, Trojan Horses
$1,500
1 per week
$1,500 x 52 weeks = $78,000
Denial-of-Service Attacks
$2,500
1 per quarter
$2,500 x 4 = $10,000
Earthquake
$250,000
1 per 20 years
$250,000 x 0.05 = $12,500
Flood
$250,000
1 per 10 years
$250,000 x 0.1 = $25,000
Fire
$500,000
1 per 10 years
$500,000 x 0.1 = $50,000
Version 2 (Explanation with Calculations):
Programmer Mistakes:
SLE = $5,000 (Cost per Incident)
ARO = 1 per week
ALE = SLE x ARO
ALE = $5,000 x 52 weeks = $260,000 per year
Loss of Intellectual Property:
SLE = $75,000
ARO = 1 per year
ALE = SLE x ARO
ALE = $75,000 x 1 = $75,000 per year
Software Piracy:
SLE = $500
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ARO = 1 per week
ALE = SLE x ARO
ALE = $500 x 52 weeks = $26,000 per year
Theft of Information (Hacker):
SLE = $2,500
ARO = 1 per quarter
ALE = SLE x ARO
ALE = $2,500 x 4 = $10,000 per year
Theft of Information (Employee):
SLE = $5,000
ARO = 1 per 6 months
ALE = SLE x ARO
ALE = $5,000 x 2 = $10,000 per year
Web Defacement:
SLE = $500
ARO = 1 per month
ALE = SLE x ARO
ALE = $500 x 12 months = $6,000 per year
Theft of Equipment:
SLE = $5,000
ARO = 1 per year
ALE = SLE x ARO
ALE = $5,000 x 1 = $5,000 per year
Virus, Worms, Trojan Horses:
SLE = $1,500
ARO = 1 per week
ALE = SLE x ARO
ALE = $1,500 x 52 weeks = $78,000 per year
Denial-of-Service Attacks:
SLE = $2,500
ARO = 1 per quarter
ALE = SLE x ARO
ALE = $2,500 x 4 = $10,000 per year
Earthquake:
SLE = $250,000
ARO = 1 per 20 years
ALE = SLE x ARO
ALE = $250,000 x 0.05 = $12,500 per year
Flood:
SLE = $250,000
ARO = 1 per 10 years
ALE = SLE x ARO
ALE = $250,000 x 0.1 = $25,000 per year
Fire:
SLE = $500,000
ARO = 1 per 10 years
ALE = SLE x ARO
ALE = $500,000 x 0.1 = $50,000 per year
Version 3 (Table with Calculations):
Here's a table summarizing the calculations for each threat category:
Threat Category
SLE
ARO
ALE
Programmer Mistakes
$5,000
1 per week
$260,000
Loss of Intellectual Property
$75,000
1 per year
$75,000
Software Piracy
$500
1 per week
$26,000
Theft of Information (Hacker)
$2,500
1 per quarter
$10,000
Theft of Information (Employee)
$5,000
1 per 6 months
$10,000
Web Defacement
$500
1 per month
$6,000
Theft of Equipment
$5,000
1 per year
$5,000
Virus, Worms, Trojan Horses
$1,500
1 per week
$78,000
Threat Category
SLE
ARO
ALE
Denial-of-Service Attacks
$2,500
1 per quarter
$10,000
Earthquake
$250,000
1 per 20 years
$12,500
Flood
$250,000
1 per 10 years
$25,000
Fire
$500,000
1 per 10 years
$50,000
Question Number 3
Version 1:
When there's no specific percentage provided to determine Exposure Factor (EF),
you can use a qualitative approach. Let's consider a scenario in financial services. If a
cyberattack could lead to a high impact, you might assign an EF of 1.0, signifying a 100%
loss of sensitive financial data and customer trust. For a medium impact, such as a temporary
disruption of online services, an EF of 0.5 could be appropriate, indicating a 50% loss of
service availability and customer confidence. This qualitative method allows you to estimate
EF without relying on percentages.
Now, in terms of the easier method for determining Single Loss Expectancy (SLE), it
depends on your available data and context. If you have precise information about the value
of the asset at risk, like a unique piece of artwork, using a percentage of value lost is
straightforward. However, if you're dealing with a less tangible asset, such as customer
goodwill, it might be more practical to calculate SLE using cost per incident. For instance,
this could include expenses related to public relations efforts, legal actions, and customer
compensation.
Version 2:
In cases where there's no specified percentage for determining Exposure Factor
(EF), a qualitative approach can be employed. Let's take the healthcare sector as an example.
If a data breach could lead to a high impact, you might assign an EF of 1.0, indicating a 100%
loss of patient records and trust. For a medium impact, like a temporary disruption of medical
services, an EF of 0.5 could be used, suggesting a 50% loss of service availability and patient
confidence. This qualitative method allows you to estimate EF without relying on specific
percentages.
Now, when deciding the easier method for determining Single Loss Expectancy (SLE), it
hinges on data availability and context. If you have precise information about the value of the
asset at risk, such as a specialized medical device, using a percentage of value lost is
straightforward. However, if the asset's value is challenging to ascertain, as in the case of
critical research data, it may be more practical to calculate SLE using cost per incident. This
might involve expenses related to data recovery, regulatory fines, and potential lawsuits.
Version 3:
When no specific percentage is provided for determining Exposure Factor (EF),
you can turn to a qualitative approach. Consider a manufacturing scenario. If a cyberattack
could lead to a high impact, like the disruption of production lines, you might assign an EF of
1.0, signifying a 100% loss of production capacity and revenue. For a medium impact, such
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
as a temporary slowdown in operations, an EF of 0.5 could be appropriate, indicating a 50%
loss of production efficiency and potential revenue. This qualitative method allows you to
estimate EF without relying on percentages.
Regarding the choice between methods for determining Single Loss Expectancy (SLE), it
depends on data availability and context. If you have accurate information about the value of
the asset at risk, like a high-value piece of manufacturing equipment, using a percentage of
value lost is straightforward. However, if the asset's value is uncertain, as in the case of
proprietary manufacturing processes, it may be more practical to calculate SLE using cost per
incident. This could encompass expenses related to equipment repair, lost production, and
contractual penalties.
Question Number 4
Version 1 (Calculations Only):
Threat Category
SLE
ARO
ALE
Programmer Mistakes
$5,000
1 per month
$5,000 x 12 = $60,000
Loss of Intellectual Property
$75,000
1 per 2 years
$75,000 x 0.5 = $37,500
Software Piracy
$500
1 per month
$500 x 12 = $6,000
Theft of Information (Hacker)
$2,500
1 per 6 months
$2,500 x 2 = $5,000
Theft of Information (Employee)
$5,000
1 per year
$5,000 x 1 = $5,000
Web Defacement
$500
1 per quarter
$500 x 4 = $2,000
Theft of Equipment
$5,000
1 per 2 years
$5,000 x 0.5 = $2,500
Virus, Worms, Trojan Horses
$1,500
1 per month
$1,500 x 12 = $18,000
Denial-of-Service Attacks
$2,500
1 per 6 months
$2,500 x 2 = $5,000
Earthquake
$250,000
1 per 20 years
$250,000 x 0.05 = $12,500
Flood
$50,000
1 per 10 years
$50,000 x 0.1 = $5,000
Fire
$100,000
1 per 10 years
$100,000 x 0.1 = $10,000
Version 2 (Explanation with Calculations):
Programmer Mistakes:
SLE = $5,000 (Cost per Incident)
ARO = 1 per month
ALE = SLE x ARO
ALE = $5,000 x 12 = $60,000 per year
Loss of Intellectual Property:
SLE = $75,000
ARO = 1 per 2 years
ALE = SLE x ARO
ALE = $75,000 x 0.5 = $37,500 per year
Software Piracy:
SLE = $500
ARO = 1 per month
ALE = SLE x ARO
ALE = $500 x 12 = $6,000 per year
Theft of Information (Hacker):
SLE = $2,500
ARO = 1 per 6 months
ALE = SLE x ARO
ALE = $2,500 x 2 = $5,000 per year
Theft of Information (Employee):
SLE = $5,000
ARO = 1 per year
ALE = SLE x ARO
ALE = $5,000 x 1 = $5,000 per year
Web Defacement:
SLE = $500
ARO = 1 per quarter
ALE = SLE x ARO
ALE = $500 x 4 = $2,000 per year
Theft of Equipment:
SLE = $5,000
ARO = 1 per 2 years
ALE = SLE x ARO
ALE = $5,000 x 0.5 = $2,500 per year
Virus, Worms, Trojan Horses:
SLE = $1,500
ARO = 1 per month
ALE = SLE x ARO
ALE = $1,500 x 12 = $18,000 per year
Denial-of-Service Attacks:
SLE = $2,500
ARO = 1 per 6 months
ALE = SLE x ARO
ALE = $2,500 x 2 = $5,000 per year
Earthquake:
SLE = $250,000
ARO = 1 per 20 years
ALE = SLE x ARO
ALE = $250,000 x 0.05 = $12,500 per year
Flood:
SLE = $50,000
ARO = 1 per 10 years
ALE = SLE x ARO
ALE = $50,000 x 0.1 = $5,000 per year
Fire:
SLE = $100,000
ARO = 1 per 10 years
ALE = SLE x ARO
ALE = $100,000 x 0.1 = $10,000 per year
Version 3 (Table with Calculations):
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Threat Category
SLE
ARO
ALE (with Control)
Programmer Mistakes
$5,000
1 per month
$60,000
Loss of Intellectual Property
$75,000
1 per 2 years
$37,500
Software Piracy
$500
1 per month
$6,000
Theft of Information (Hacker)
$2,500
1 per 6 months
$5,000
Theft of Information (Employee)
$5,000
1 per year
$5,000
Web Defacement
$500
1 per quarter
$2,000
Theft of Equipment
$5,000
1 per 2 years
$2,500
Virus, Worms, Trojan Horses
$1,500
1 per month
$18,000
Denial-of-Service Attacks
$2,500
1 per 6 months
$5,000
Earthquake
$250,000
1 per 20 years
$12,500
Flood
$50,000
1 per 10 years
$5,000
Fire
$100,000
1 per 10 years
$10,000
Related Documents
Recommended textbooks for you
![Text book image](https://www.bartleby.com/isbn_cover_images/9781259929434/9781259929434_smallCoverImage.gif)
Understanding Business
Management
ISBN:9781259929434
Author:William Nickels
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134527604/9780134527604_smallCoverImage.gif)
Management (14th Edition)
Management
ISBN:9780134527604
Author:Stephen P. Robbins, Mary A. Coulter
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305947412/9781305947412_smallCoverImage.gif)
Spreadsheet Modeling & Decision Analysis: A Pract...
Management
ISBN:9781305947412
Author:Cliff Ragsdale
Publisher:Cengage Learning
![Text book image](https://compass-isbn-assets.s3.amazonaws.com/isbn_cover_images/9780135191798/9780135191798_smallCoverImage.jpg)
Management Information Systems: Managing The Digi...
Management
ISBN:9780135191798
Author:Kenneth C. Laudon, Jane P. Laudon
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134728391/9780134728391_smallCoverImage.gif)
Business Essentials (12th Edition) (What's New in...
Management
ISBN:9780134728391
Author:Ronald J. Ebert, Ricky W. Griffin
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134237473/9780134237473_smallCoverImage.gif)
Fundamentals of Management (10th Edition)
Management
ISBN:9780134237473
Author:Stephen P. Robbins, Mary A. Coulter, David A. De Cenzo
Publisher:PEARSON
Recommended textbooks for you
- Understanding BusinessManagementISBN:9781259929434Author:William NickelsPublisher:McGraw-Hill EducationManagement (14th Edition)ManagementISBN:9780134527604Author:Stephen P. Robbins, Mary A. CoulterPublisher:PEARSONSpreadsheet Modeling & Decision Analysis: A Pract...ManagementISBN:9781305947412Author:Cliff RagsdalePublisher:Cengage Learning
- Management Information Systems: Managing The Digi...ManagementISBN:9780135191798Author:Kenneth C. Laudon, Jane P. LaudonPublisher:PEARSONBusiness Essentials (12th Edition) (What's New in...ManagementISBN:9780134728391Author:Ronald J. Ebert, Ricky W. GriffinPublisher:PEARSONFundamentals of Management (10th Edition)ManagementISBN:9780134237473Author:Stephen P. Robbins, Mary A. Coulter, David A. De CenzoPublisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781259929434/9781259929434_smallCoverImage.gif)
Understanding Business
Management
ISBN:9781259929434
Author:William Nickels
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134527604/9780134527604_smallCoverImage.gif)
Management (14th Edition)
Management
ISBN:9780134527604
Author:Stephen P. Robbins, Mary A. Coulter
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781305947412/9781305947412_smallCoverImage.gif)
Spreadsheet Modeling & Decision Analysis: A Pract...
Management
ISBN:9781305947412
Author:Cliff Ragsdale
Publisher:Cengage Learning
![Text book image](https://compass-isbn-assets.s3.amazonaws.com/isbn_cover_images/9780135191798/9780135191798_smallCoverImage.jpg)
Management Information Systems: Managing The Digi...
Management
ISBN:9780135191798
Author:Kenneth C. Laudon, Jane P. Laudon
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134728391/9780134728391_smallCoverImage.gif)
Business Essentials (12th Edition) (What's New in...
Management
ISBN:9780134728391
Author:Ronald J. Ebert, Ricky W. Griffin
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134237473/9780134237473_smallCoverImage.gif)
Fundamentals of Management (10th Edition)
Management
ISBN:9780134237473
Author:Stephen P. Robbins, Mary A. Coulter, David A. De Cenzo
Publisher:PEARSON