Task back to top The assignment involves you producing a comprehensive risk report for your organisation given a particular scenario. You will be required to offer professional views based on a well...

1 answer below »

Task


back to top

The assignment involves you producing a comprehensive risk report for your organisation given a particular scenario. You will be required to offer professional views based on a well established research.


Technical Risk Analysis (20 marks)


You have been hired by a small IT company to analyse the technology environment and conduct a technical risk analysis. You are to prepare a management report applying everything you learnt in the subject. The report should include at a minimum:



  • An Executive Summary at the beginning of the report which provides a clear statement of the technology project that is being assessed, and an overview of your recommendations to management as to the merits of the project based on your risk assessment.

  • A risk assessment based on assets, threats, vulnerabilities and consequences derived from an IT control framework and any existing industry risk recommendations for the project. Identify and discuss the key threats. What could be done to mitigate the risks and their impact on the organisation?

  • Provide a brief summary of the protection mechanisms you would employ whether they be people, culture or technology.

  • Identify any gaps which you believe require further analysis and offer a rationale as to why.


Your report should be no more than 6 pages.


Organisational Details.


The organization in question is small software house. The software house is working on innovative software, which it plans to sell in the near future. Most code and documentation is stored on servers, which are publicly accessible via the Internet. The organization has a considerable investment in this data (for corporate purposes), hence its integrity and confidentially is important.


The organization has a number of staff that are responsible for the management of the server infrastructure, however administration is somewhat lacked with many people across the organization knowing administrative passwords. At present there isn’t a full time administrator – the administration of services and systems seems to be the role of several developers who know ‘some stuff’. Employees of the organization currently enjoy free, open, unrestricted access to the Internet but realistically they only need to browse certain websites on the Internet. The management would like there to be a system in place to minimise the cost of accessing web resources.


The organization consists of the following departments:



  • Research and Development (56 people)

  • Management (4 people)

  • Human Resources & Legal (5 people)

  • Finance (3 person)


There are no formal onboarding and offboarding processes in the organisation. There is close to no policy framework in the organisation.


Infrastructure.


The organization uses a number of servers to perform its core business. The servers are not very busy. In total there are six servers. These servers include a CIFS (Windows File Sharing) Server (running on a Windows NT server), Windows Active Directory Server (running on a Windows NT server), Apache Web Server (running on Mac OS X machine), Development Server (typically accessed using telnet and ftp) (running on Linux), Exchange Server (running on a Windows NT Server) and Oracle Server (running on a Solaris – Sun machine). Each of these servers are, independent machines with vanilla installs of the operating system. The servers are not running the latest operating systems nor have they been patched. These machines have publicly accessible addresses and hence can be access from the Internet.


The servers are commodity x86 boxes or servers that have been acquired through various means i.e. the Sparc Station was purchased from Ebay by some employee’s who wanted to learn Solaris and the Mac, well it was purchased because there is a Mac head in the organization who really loves Mac’s.


There is no maintenance on either the hardware or software. Some of the servers are over five years old e.g. the Sparc Station.


Services and Data.


The servers store the following;



  • Home directories,

  • Mail,

  • Database objects for various development and production environments (for various departments),

  • Active Directory Meta Data Object,

  • Project Build and Information Directories,

  • Code Versioning System (CVS) Data/ Directories,

  • Corporate Finance and Personnel Data,

  • Web Page Data.

  • Customer and Market Intelligence.

  • Other forms of Intellectual Property


This data is stored on disks in a number of different boxes. For example the Mail Exchange server stores mail on a internal disk. Where as the Oracle Databases are kept on the oracle servers using a number of disks. The Oracle server also plays home to most of the corporate data. Project Build and CVS data are kept on the development server, which web pages are kept on the web server.


Most services are only used within the organization, however the organization does have a internet presence via its web page and mail server. Despite this some developers work from home in the evenings and access some services e.g. CVS from there home workstation. You can assume there is no redundancy/ fail over in the disks hence if a disk goes bad, that data is lost and the service associated with it fails.


The most important data is the organizations data (mail, web and corporate finance/ personnel data), project builds and CVS information. The integrity of this data must always be preserved. In terms of services the most important service are the web page, email service and CVS infrastructure.


Administration.


Most of the staff in the organization knows the root/ administration passwords to the servers. Most of the administration of the hosts is done via the network using tools such as telnet and rsh. It should be noted that all users have accounts on every server regardless of if they are admin’s.


The administrators do a bad job of administering these machines, as disks are often filling up and there are lots of active but unused accounts (because people leave the organization). The organization depends on the services offered by its servers so very much for its business but there is nothing in place to monitor them. System administration here is basically fire fighting.


External hackers have compromised some desktop machines in the past. The administrators are reasonably confidant that the servers have no been compromised yet (this is probably sheer luck but they are unsure about this). That said when a host is compromised; the administrators merely disable the hack and continue to allow the machine to be used. Most compromises are noticed too late i.e. well after they have been done.


Security.


The organization does not have a firewall or any other security system in place. Currently all services offered by the servers are accessible via the Internet. There is no email/ virus protection in this organization.


Backup and Disaster Recovery.


The organization does not have any backup or disaster recovery systems/ procedures.


Network and Physical Location.


The servers and core network infrastructure are located in common workspace as other infrastructure and employee’s of the organisation. In addition to this the servers are on the same networks as user workstations and there is no network security. The organization is connected to the Internet via a ADSL modem connected to a router. The router connects to a several 10mb hubs, which provide access to the staff (there is only one LAN).


Individual Workstations & Passwords.


Each employee has a desktop computer. Most of the computers are running a vanilla install of a Windows like operating system that has not been patched since install. Employees keep corporate data on these hosts in their home directory, which is not backed up.


In addition to this everyone has administrator privileges to their workstation. As the environment is relaxed, a user can have accounts on other employee computers possibly using the same or different password.


The organization has no hard and fast rules about passwords; infact the most common password used is the person’s name. These passwords are also indicative of what is used on the server machines.






Rationale


back to top

This assessment task will assess the following learning outcome/s:



  • be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.

  • be able to apply both quantitative and qualitative risk management approaches and to compare and contrast the advantages of each approach.

  • be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.

  • be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Answered Same DayFeb 03, 2021ITC596Charles Sturt University

Answer To: Task back to top The assignment involves you producing a comprehensive risk report for your...

Ankit answered on Feb 04 2021
135 Votes
Student Id    
                    Student Name
                    Small software House Risk analysis
Table of contents
    Topic
    Page Number
    Executive Summary
    3 to 5
     Risk assessment
    5 to 8
    Protection techniques
    8 to 9
    Recommendation
     10
    References
    11
1. Executive Summary
Today many software companies small, medium or large are performing risk analysis to make better decisions at business. There a
re many benefits of performing risk analysis before implementing new methodologies in companies as listed below:
· Recognizing drawbacks and revealing open doors user didn't know about.
· Knowing the risk factors which are very much essential and have the greatest effect on the reality
· Pointing explicit factors to abstain from squandering assets on low-affect or very far-fetched occasions
· Better reliability, put forth your defence all the more powerfully to upper administration, corporate, or different partners when subsidizing is required.
Vulnerabilities or threats are highly genuine and risky for organization network that halts the system performance by attacking on assets, hardware and software. Data security is very essential for every firm. The organization should focus on data security from start up which will aid firm to better working inside an organization and create safe platform for staff employees.
As a small IT company employee, I have to perform risk analysis for their innovative software that has planned to sell things later on. Currently our firm save code and their document files on server.
1.1 About Small Software House
Small Software House is small software Company which is currently working for their unique app. Small Software House is building software that has planned to sell things later on. Presently, there are four departments of company i.e. Research and development having 56 employees, Management department having 4 employees, Human resource and legal department having 5 employees and Finance department having 3 employees. The assets used by the company give the support to their business operation but there is no firewall policy and security policy for the hardware, software, assets and the network design
1.2 Technology
There are total six servers for small software house that perform their business task. The server for Small Software House consist of CIFS (Windows File Sharing) Server that runs on a Windows NT server, Windows Active Directory Server that runs on a Windows NT server, Apache Web Server that runs on Mac OS X machine, development Server which typically accessed using telnet and ftp that run on Linux, exchange Server that run on a Windows NT Server and oracle Server that run on a Solaris Sun machine. The server stores home directories, mail, database objects, active directory Meta object, code versioning data, web page data, Corporate Finance and Personnel Data, customer and market intelligence etc. All data is stored on disks in various folders. The two tools used by network administrators to perform data or network tasks on server are telnet and rsh. Our company has no firewall program or anti-virus program installed on user system and servers. All the user system has desktop system with vanilla Operating system and they placed all their business data on home directory.
1.3 Recommendations to management
“A risk assessment is a systematic method of looking at work activities, considering what could go wrong, and deciding on suitable control measures to prevent loss, damage or injury in the workplace. The Assessment should include the controls required to eliminate, reduce or minimize the risks.” [i-sight]
Risk assessment is the term that explains about the threats or vulnerabilities in IT Company, their database, server and assets in business. The Risk Management plays important role for the firm as it gives aid in assessing the level of risk to their network or server system. Performing a risk assessment inside the firm may help users to reduce risks, good comply with...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here