Global Tech is a website for online selling of the sports goods. The employees authentication mechanism has been kept strict, the employee authentication credential have updated regularly with standard procedure on their workstations. All these workstations have low level information related to sale and purchase only and no customers banking data. The server room has guards and all authorized employees are verified by the security, the server holds the most critical business process, unauthorized access to the server room may lead to major system damage. The guards switch over their duty 12 hourly. Global Tech website contents have been verified by the senior staff as well as proper check has been made on the client-server sessions to avoid website crash. The contents of the website mostly related to the general information about the products for sale, as sale and purchase has been done through third party. Furthermore, the firewall rules are updated occasionally so there might be a chance of DOS attack. Customers banking data has been stored on the SAN storage, this data is encrypted but there are chances leakage as salt and encryption are not added to the customer credentials. It has been observed that SAN storage system is under constant threat due to increase online shopping, as hackers likely attempt it as a customer. This leakage might be complete mission failure for the Global Tech. You are required to assess the risk of the following IT assets in your facility with proper justification and scoring.    Asset Vulnerability P I R Work station Weak authentication       Server Unauthorized access to the server room       Website Firewall configured properly and has good DDOS mitigation       SAN storage system Data protection but contains error       P=Probability I=Impact R=Risk   Following criteria can be used to for the risk assessment Probability: 5: Frequent 4: Likely 3: Occasional 2: Seldom 1: Unlikely Impact: 4: Catastrophic: Complete mission failure, death, bankruptcy 3: Critical: Major mission degradation, major system damage, exposure of sensitive data 2: Moderate: Minor mission degradation, minor system damage, exposure of data 1: Negligible: Some mission degradation

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Global Tech is a website for online selling of the sports goods. The employees authentication mechanism has been kept strict, the employee authentication credential have updated regularly with standard procedure on their workstations. All these workstations have low level information related to sale and purchase only and no customers banking data. The server room has guards and all authorized employees are verified by the security, the server holds the most critical business process, unauthorized access to the server room may lead to major system damage. The guards switch over their duty 12 hourly.

Global Tech website contents have been verified by the senior staff as well as proper check has been made on the client-server sessions to avoid website crash. The contents of the website mostly related to the general information about the products for sale, as sale and purchase has been done through third party. Furthermore, the firewall rules are updated occasionally so there might be a chance of DOS attack. Customers banking data has been stored on the SAN storage, this data is encrypted but there are chances leakage as salt and encryption are not added to the customer credentials. It has been observed that SAN storage system is under constant threat due to increase online shopping, as hackers likely attempt it as a customer. This leakage might be complete mission failure for the Global Tech.

You are required to assess the risk of the following IT assets in your facility with proper justification and scoring. 

 

Asset

Vulnerability

P

I

R

Work station

Weak authentication

 

 

 

Server

Unauthorized access to the server room

 

 

 

Website

Firewall configured properly and has good DDOS mitigation

 

 

 

SAN storage system

Data protection but contains error

 

 

 

  • P=Probability
  • I=Impact
  • R=Risk

 

Following criteria can be used to for the risk assessment

Probability:

5: Frequent

4: Likely

3: Occasional

2: Seldom

1: Unlikely

Impact:

4: Catastrophic: Complete mission failure, death, bankruptcy

3: Critical: Major mission degradation, major system damage, exposure of sensitive data

2: Moderate: Minor mission degradation, minor system damage, exposure of data

1: Negligible: Some mission degradation

Expert Solution
steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Security Techniques and tools
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education