PCS 3 all versions - Copy

docx

School

Griffith University *

*We aren’t endorsed by this school

Course

3208AFE

Subject

Management

Date

Nov 24, 2024

Type

docx

Pages

13

Uploaded by CheiFNaviGator

Report
Chapter 6 Question Number 1 Version 1: For an organization conducting risk management assessments on three distinct information assets, as described in the data below, we need to determine which vulnerability should be assessed for additional controls first and which one should be assessed last: 1. Switch 147 is responsible for connecting a network to the Internet. It has two vulnerabilities: Susceptibility to hardware failure (Likelihood: 2) Susceptibility to an SNMP buffer overflow attack (Likelihood: 1) 2. Server WebSrv6 is responsible for hosting the company's website and facilitating e- commerce transactions. It's vulnerable to attacks via invalid Unicode values with a likelihood of 3. 3. Operators use Control Console MGMT45 to monitor server room operations. This console lacks passwords and is susceptible to unlogged misuse by operators, with a likelihood of 2. Prioritization for Additional Controls: Server WebSrv6: This should be evaluated for additional controls first. The likelihood of attacks via invalid Unicode values is moderately high (Likelihood: 3), and this vulnerability can significantly impact the organization's web presence and e- commerce transactions. Control Console MGMT45: Next, assess the vulnerability of unlogged misuse by operators on the Control Console MGMT45. While the likelihood is moderate (Likelihood: 2), it's still more likely to be exploited than the vulnerability in Switch 147. Switch 147: Evaluate the vulnerability of susceptibility to an SNMP buffer overflow attack last. Although it's important, the likelihood is the lowest among the three vulnerabilities (Likelihood: 1). Version 2: In the context of risk management for an organization's three information assets, we aim to identify which vulnerability should be prioritized for additional controls and which one should be considered last: 1. Switch 147 serves as the connection between the network and the Internet. It faces two vulnerabilities: Susceptibility to hardware failure (Likelihood: 2) Susceptibility to an SNMP buffer overflow attack (Likelihood: 1)
2. Server WebSrv6 hosts the company's website and manages e-commerce transactions. It's susceptible to attacks via invalid Unicode values, with a likelihood rating of 3. 3. Operators utilize the Control Console MGMT45 for monitoring server room operations. This console lacks passwords and is susceptible to unlogged misuse by operators, with a likelihood of 2. Prioritization for Additional Controls: Server WebSrv6: Begin with this vulnerability, which is vulnerable to attacks via invalid Unicode values. With a moderate likelihood (Likelihood: 3), it poses a significant risk to the organization's web services and transactions. Control Console MGMT45: Assess the vulnerability of unlogged misuse by operators on the Control Console MGMT45 next. Although the likelihood is moderate (Likelihood: 2), it's more likely to be exploited compared to the vulnerability in Switch 147. Switch 147: Evaluate the vulnerability related to susceptibility to an SNMP buffer overflow attack last, as it has the lowest likelihood (Likelihood: 1) among the three vulnerabilities. Version 3: For risk management purposes within an organization, we need to determine the order in which vulnerabilities should be assessed for additional controls - which one should be addressed first and which should be addressed last, considering the following information assets: 1. Switch 147 facilitates the network's connection to the Internet and exhibits two vulnerabilities: Susceptibility to hardware failure (Likelihood: 2) Susceptibility to an SNMP buffer overflow attack (Likelihood: 1) 2. Server WebSrv6 plays a critical role in hosting the company's website and conducting e-commerce transactions. It's vulnerable to attacks via invalid Unicode values, with a likelihood rating of 3. 3. The Control Console MGMT45 is employed by operators for monitoring server room operations. This console is deficient in password protection and is susceptible to unlogged misuse by operators, with a likelihood of 2. Prioritization for Additional Controls: Server WebSrv6: Start by assessing this vulnerability, which is vulnerable to attacks via invalid Unicode values. It carries a moderate likelihood (Likelihood: 3) and can significantly impact the organization's online services and transactions. Control Console MGMT45: Next, evaluate the vulnerability related to unlogged misuse by operators on the Control Console MGMT45. Although the likelihood is
moderate (Likelihood: 2), it's more likely to be exploited compared to the vulnerability in Switch 147. Switch 147: Finally, assess the vulnerability concerning susceptibility to an SNMP buffer overflow attack last, as it has the lowest likelihood (Likelihood: 1) among the three vulnerabilities. Question Number 3 Version 1: In Chapter 6, the list of threats to InfoSec was outlined, but there are additional threats worth considering. Firstly, we have the threat of "Insider Espionage." While the chapter discussed insider threats, it didn't delve into the specific danger of employees or contractors intentionally spying for external entities. This threat can be particularly damaging, as insiders have access to sensitive data and may misuse it for financial gain or espionage purposes. Secondly, we have the threat of "Supply Chain Compromises." Although the chapter touched on third-party risks, it didn't emphasize the potential dangers of compromised suppliers. An attacker infiltrating a supplier's systems could inject malicious code into products or services, leading to widespread vulnerabilities in the supply chain. Lastly, the chapter didn't address the threat of "Emerging Technologies." With the rapid evolution of technology, new threats are constantly emerging. For example, the rise of quantum computing poses a threat to encryption methods used to secure data today. This evolving landscape requires InfoSec professionals to stay vigilant and adapt to emerging threats proactively. Version 2: While Chapter 6 highlighted several InfoSec threats, it missed some crucial ones that merit attention. One such threat is "Social Engineering through Social Media." Although social engineering was discussed, the chapter didn't explore how attackers leverage information from social media platforms to manipulate individuals or organizations. Hackers can use seemingly innocuous details shared on social media to craft convincing phishing attacks or gain unauthorized access. Another underemphasized threat is "Physical Security Breaches." While the chapter mainly focused on digital threats, physical security is equally important. Unauthorized access to data centers or offices can lead to data theft or infrastructure damage, and this wasn't covered extensively in the chapter. Lastly, "Disaster-Related Threats" were not thoroughly addressed. Natural disasters, such as earthquakes or floods, can disrupt InfoSec systems. Additionally, the potential for cyberattacks during or after such events wasn't explored in detail. Organizations need to have robust disaster recovery plans that encompass InfoSec to mitigate these risks effectively. Version 3:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
In Chapter 6, several InfoSec threats were discussed, but some were overlooked. One significant omission is "Malicious Insider Collaborations." While insider threats were mentioned, the chapter didn't delve into the danger of multiple insiders colluding to breach security. Such collaborations can be harder to detect and can result in more severe breaches due to the combined knowledge and access of the insiders involved. Another missed threat is "Third-Party Vendor Negligence." Although third-party risks were acknowledged, the chapter didn't explore the risk of vendors not adequately safeguarding shared data. Vendors may have weaker security measures, making them attractive targets for attackers seeking entry into an organization's network. Lastly, the chapter didn't address "Zero-Day Vulnerabilities" explicitly. These are undisclosed software vulnerabilities that hackers can exploit before developers release patches. The rapidly changing threat landscape requires InfoSec professionals to stay vigilant for zero-day threats that could be used against their systems. Question Number 5 Version 1: To perform a preliminary risk assessment using the asset valuation method, apply it to the information stored in your home. Begin by gauging the financial worth of critical documents like property deeds, vehicle titles, and legal contracts. Calculate the cost of replacing these items. Next, assess the sentimental value of family photos, home videos, and personal mementos; these items may not have a direct monetary value but hold immense emotional importance. Finally, consider the financial impact of losing financial records like tax returns, investment portfolios, and loan agreements. These three dimensions of valuation provide a holistic understanding of the data's significance. Version 2: When employing the asset valuation method for a preliminary risk assessment of your home's information, you must evaluate its various aspects. Firstly, assess the monetary value by calculating the cost of replacing vital documents such as identification cards, deeds, and insurance policies. Secondly, delve into the sentimental value of irreplaceable items like family photos, heirlooms, and handwritten letters; these items may not have a price tag, but their loss can be emotionally devastating. Lastly, consider the financial implications of losing critical records like tax documents, investment portfolios, and loan agreements. By addressing these valuation questions, you gain a more comprehensive understanding of the importance of the data in your home. Version 3: To conduct a preliminary risk assessment using the asset valuation method, apply it to the information within your home. Begin by evaluating the financial worth of essential documents such as property titles, legal contracts, and insurance policies. Calculate the replacement cost for these items. Next, reflect on the sentimental value of family photographs, home videos, and personal keepsakes. While these items may lack a specific
monetary value, their loss could be emotionally devastating. Lastly, consider the financial consequences of losing critical financial records like tax returns, investment portfolios, and loan agreements. These valuation questions offer a multifaceted view of the significance of the data in your home.
Chapter 7 Question Number 1 Version 1: Threat Category SLE ARO ALE Programmer Mistakes $5,000 1 per week $5,000 x 52 weeks = $260,000 Loss of Intellectual Property $75,000 1 per year $75,000 x 1 = $75,000 Software Piracy $500 1 per week $500 x 52 weeks = $26,000 Theft of Information (Hacker) $2,500 1 per quarter $2,500 x 4 = $10,000 Theft of Information (Employee) $5,000 1 per 6 months $5,000 x 2 = $10,000 Web Defacement $500 1 per month $500 x 12 months = $6,000 Theft of Equipment $5,000 1 per year $5,000 x 1 = $5,000 Virus, Worms, Trojan Horses $1,500 1 per week $1,500 x 52 weeks = $78,000 Denial-of-Service Attacks $2,500 1 per quarter $2,500 x 4 = $10,000 Earthquake $250,000 1 per 20 years $250,000 x 0.05 = $12,500 Flood $250,000 1 per 10 years $250,000 x 0.1 = $25,000 Fire $500,000 1 per 10 years $500,000 x 0.1 = $50,000 Version 2 (Explanation with Calculations): Programmer Mistakes: SLE = $5,000 (Cost per Incident) ARO = 1 per week ALE = SLE x ARO ALE = $5,000 x 52 weeks = $260,000 per year Loss of Intellectual Property: SLE = $75,000 ARO = 1 per year ALE = SLE x ARO ALE = $75,000 x 1 = $75,000 per year Software Piracy: SLE = $500
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ARO = 1 per week ALE = SLE x ARO ALE = $500 x 52 weeks = $26,000 per year Theft of Information (Hacker): SLE = $2,500 ARO = 1 per quarter ALE = SLE x ARO ALE = $2,500 x 4 = $10,000 per year Theft of Information (Employee): SLE = $5,000 ARO = 1 per 6 months ALE = SLE x ARO ALE = $5,000 x 2 = $10,000 per year Web Defacement: SLE = $500 ARO = 1 per month ALE = SLE x ARO ALE = $500 x 12 months = $6,000 per year Theft of Equipment: SLE = $5,000 ARO = 1 per year ALE = SLE x ARO ALE = $5,000 x 1 = $5,000 per year Virus, Worms, Trojan Horses: SLE = $1,500 ARO = 1 per week ALE = SLE x ARO ALE = $1,500 x 52 weeks = $78,000 per year Denial-of-Service Attacks: SLE = $2,500
ARO = 1 per quarter ALE = SLE x ARO ALE = $2,500 x 4 = $10,000 per year Earthquake: SLE = $250,000 ARO = 1 per 20 years ALE = SLE x ARO ALE = $250,000 x 0.05 = $12,500 per year Flood: SLE = $250,000 ARO = 1 per 10 years ALE = SLE x ARO ALE = $250,000 x 0.1 = $25,000 per year Fire: SLE = $500,000 ARO = 1 per 10 years ALE = SLE x ARO ALE = $500,000 x 0.1 = $50,000 per year Version 3 (Table with Calculations): Here's a table summarizing the calculations for each threat category: Threat Category SLE ARO ALE Programmer Mistakes $5,000 1 per week $260,000 Loss of Intellectual Property $75,000 1 per year $75,000 Software Piracy $500 1 per week $26,000 Theft of Information (Hacker) $2,500 1 per quarter $10,000 Theft of Information (Employee) $5,000 1 per 6 months $10,000 Web Defacement $500 1 per month $6,000 Theft of Equipment $5,000 1 per year $5,000 Virus, Worms, Trojan Horses $1,500 1 per week $78,000
Threat Category SLE ARO ALE Denial-of-Service Attacks $2,500 1 per quarter $10,000 Earthquake $250,000 1 per 20 years $12,500 Flood $250,000 1 per 10 years $25,000 Fire $500,000 1 per 10 years $50,000 Question Number 3 Version 1: When there's no specific percentage provided to determine Exposure Factor (EF), you can use a qualitative approach. Let's consider a scenario in financial services. If a cyberattack could lead to a high impact, you might assign an EF of 1.0, signifying a 100% loss of sensitive financial data and customer trust. For a medium impact, such as a temporary disruption of online services, an EF of 0.5 could be appropriate, indicating a 50% loss of service availability and customer confidence. This qualitative method allows you to estimate EF without relying on percentages. Now, in terms of the easier method for determining Single Loss Expectancy (SLE), it depends on your available data and context. If you have precise information about the value of the asset at risk, like a unique piece of artwork, using a percentage of value lost is straightforward. However, if you're dealing with a less tangible asset, such as customer goodwill, it might be more practical to calculate SLE using cost per incident. For instance, this could include expenses related to public relations efforts, legal actions, and customer compensation. Version 2: In cases where there's no specified percentage for determining Exposure Factor (EF), a qualitative approach can be employed. Let's take the healthcare sector as an example. If a data breach could lead to a high impact, you might assign an EF of 1.0, indicating a 100% loss of patient records and trust. For a medium impact, like a temporary disruption of medical services, an EF of 0.5 could be used, suggesting a 50% loss of service availability and patient confidence. This qualitative method allows you to estimate EF without relying on specific percentages. Now, when deciding the easier method for determining Single Loss Expectancy (SLE), it hinges on data availability and context. If you have precise information about the value of the asset at risk, such as a specialized medical device, using a percentage of value lost is straightforward. However, if the asset's value is challenging to ascertain, as in the case of critical research data, it may be more practical to calculate SLE using cost per incident. This might involve expenses related to data recovery, regulatory fines, and potential lawsuits. Version 3: When no specific percentage is provided for determining Exposure Factor (EF), you can turn to a qualitative approach. Consider a manufacturing scenario. If a cyberattack could lead to a high impact, like the disruption of production lines, you might assign an EF of 1.0, signifying a 100% loss of production capacity and revenue. For a medium impact, such
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
as a temporary slowdown in operations, an EF of 0.5 could be appropriate, indicating a 50% loss of production efficiency and potential revenue. This qualitative method allows you to estimate EF without relying on percentages. Regarding the choice between methods for determining Single Loss Expectancy (SLE), it depends on data availability and context. If you have accurate information about the value of the asset at risk, like a high-value piece of manufacturing equipment, using a percentage of value lost is straightforward. However, if the asset's value is uncertain, as in the case of proprietary manufacturing processes, it may be more practical to calculate SLE using cost per incident. This could encompass expenses related to equipment repair, lost production, and contractual penalties. Question Number 4 Version 1 (Calculations Only): Threat Category SLE ARO ALE Programmer Mistakes $5,000 1 per month $5,000 x 12 = $60,000 Loss of Intellectual Property $75,000 1 per 2 years $75,000 x 0.5 = $37,500 Software Piracy $500 1 per month $500 x 12 = $6,000 Theft of Information (Hacker) $2,500 1 per 6 months $2,500 x 2 = $5,000 Theft of Information (Employee) $5,000 1 per year $5,000 x 1 = $5,000 Web Defacement $500 1 per quarter $500 x 4 = $2,000 Theft of Equipment $5,000 1 per 2 years $5,000 x 0.5 = $2,500 Virus, Worms, Trojan Horses $1,500 1 per month $1,500 x 12 = $18,000 Denial-of-Service Attacks $2,500 1 per 6 months $2,500 x 2 = $5,000 Earthquake $250,000 1 per 20 years $250,000 x 0.05 = $12,500 Flood $50,000 1 per 10 years $50,000 x 0.1 = $5,000 Fire $100,000 1 per 10 years $100,000 x 0.1 = $10,000 Version 2 (Explanation with Calculations): Programmer Mistakes: SLE = $5,000 (Cost per Incident) ARO = 1 per month ALE = SLE x ARO
ALE = $5,000 x 12 = $60,000 per year Loss of Intellectual Property: SLE = $75,000 ARO = 1 per 2 years ALE = SLE x ARO ALE = $75,000 x 0.5 = $37,500 per year Software Piracy: SLE = $500 ARO = 1 per month ALE = SLE x ARO ALE = $500 x 12 = $6,000 per year Theft of Information (Hacker): SLE = $2,500 ARO = 1 per 6 months ALE = SLE x ARO ALE = $2,500 x 2 = $5,000 per year Theft of Information (Employee): SLE = $5,000 ARO = 1 per year ALE = SLE x ARO ALE = $5,000 x 1 = $5,000 per year Web Defacement: SLE = $500 ARO = 1 per quarter ALE = SLE x ARO ALE = $500 x 4 = $2,000 per year Theft of Equipment: SLE = $5,000 ARO = 1 per 2 years ALE = SLE x ARO
ALE = $5,000 x 0.5 = $2,500 per year Virus, Worms, Trojan Horses: SLE = $1,500 ARO = 1 per month ALE = SLE x ARO ALE = $1,500 x 12 = $18,000 per year Denial-of-Service Attacks: SLE = $2,500 ARO = 1 per 6 months ALE = SLE x ARO ALE = $2,500 x 2 = $5,000 per year Earthquake: SLE = $250,000 ARO = 1 per 20 years ALE = SLE x ARO ALE = $250,000 x 0.05 = $12,500 per year Flood: SLE = $50,000 ARO = 1 per 10 years ALE = SLE x ARO ALE = $50,000 x 0.1 = $5,000 per year Fire: SLE = $100,000 ARO = 1 per 10 years ALE = SLE x ARO ALE = $100,000 x 0.1 = $10,000 per year Version 3 (Table with Calculations):
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Threat Category SLE ARO ALE (with Control) Programmer Mistakes $5,000 1 per month $60,000 Loss of Intellectual Property $75,000 1 per 2 years $37,500 Software Piracy $500 1 per month $6,000 Theft of Information (Hacker) $2,500 1 per 6 months $5,000 Theft of Information (Employee) $5,000 1 per year $5,000 Web Defacement $500 1 per quarter $2,000 Theft of Equipment $5,000 1 per 2 years $2,500 Virus, Worms, Trojan Horses $1,500 1 per month $18,000 Denial-of-Service Attacks $2,500 1 per 6 months $5,000 Earthquake $250,000 1 per 20 years $12,500 Flood $50,000 1 per 10 years $5,000 Fire $100,000 1 per 10 years $10,000