Information Security Risks Assessment: A Case Study

12/11/2018
by   Samuel Cris Ayo, et al.
0

Owing to recorded incidents of Information technology inclined organisations failing to respond effectively to threat incidents, this project outlines the benefits of conducting a comprehensive risk assessment which would aid proficiency in responding to potential threats. The ultimate goal is primarily to identify, quantify and control the key threats that are detrimental to achieving business objectives. This project carries out a detailed risk assessment for a case study organisation. It includes a comprehensive literature review analysing several professional views on pressing issues in Information security. In the risk register, five prominent assets were identified in respect to their owners. The work is followed by a qualitative analysis methodology to determine the magnitude of the potential threats and vulnerabilities. Collating these parameters enabled the valuation of individual risk per asset, per threat and vulnerability. Evaluating a risk appetite aided in prioritising and determining acceptable risks. From the analysis, it was deduced that human being posed the greatest Information security risk through intentional/ unintentional human error. In conclusion, effective control techniques based on defence in-depth were devised to mitigate the impact of the identified risks from risk register.

READ FULL TEXT

page 2

page 5

page 6

page 8

page 9

research
10/14/2021

Assessing Risks and Modeling Threats in the Internet of Things

Threat modeling and risk assessments are common ways to identify, estima...
research
07/26/2023

Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment

Risk assessment plays a crucial role in ensuring the security and resili...
research
10/08/2019

Finding Security Threats That Matter: An Industrial Case Study

Recent trends in the software engineering (i.e., Agile, DevOps) have sho...
research
06/15/2022

A Continuous Risk Assessment Methodology for Cloud Infrastructures

Cloud systems are dynamic environments which make it difficult to keep t...
research
05/09/2023

PSP Framework: A novel risk assessment method in compliance with ISO/SAE-21434

As more cars connect to the internet and other devices, the automotive m...
research
03/08/2019

ABC: A Cryptocurrency-Focused Threat Modeling Framework

Cryptocurrencies are an emerging economic force, but there are concerns ...
research
07/27/2018

A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies

Various researchers have shown that the Common Vulnerability Scoring Sys...

Please sign up or login with your details

Forgot password? Click here to reset