Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

KAU Part I: Problem definition Innova Tech is an enterprise software vendor located in Riyadh, Saudi Arabia, The company provides services and software solutions to

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
KAU Part I: Problem definition Innova Tech is an enterprise software vendor located in Riyadh, Saudi Arabia, The company provides services and software solutions to satisfy the needs of organizations. Innova Tech provides its customers with business-oriented tools such as online shopping online payment, and automated balling systems Good Luck J Page 2 of 6 Ahmad, the CRO, chief risk officer, decided to update and improve reporting on the top risks facing the company. Through a series of risk identification activities, Ahmad and his cyber risk team have concluded that one of the external threats with potential high concern to the company is email phishing attacks. Through email phishing, threat actors could gain access to the company's network and possibly breach sensitive data. Ahmad and his team considered the various systems in the company and resolved that the largest risk exposure is associated with the Customer database (C-DB). The C-DB stores sensitive information about customers information purchased products, time of purchase, etc. The CRO asked the cyber risk team to investigate and conduct a risk analysis. Part II: Collecting Data & Estimates The cyber risk team held meetings with teams from across the company and obtained the following information - In the company archive, there are no documents about this type of breach occurring within the last 10 years. - There is limited knowledge of past security events and their causes because the Incident Response Team does not often perform root cause analysis on incidents. - The Network Security Team reports that they detect malicious activity on the network on average 10 times a day. They estimate that the customer website is being scanned remotely between 1 and 7 times per day. - The Application Security Team estimates that 850 connections are made to the C DB each day, and the site has not experienced an unplanned outage in the last 5 years The Security Team discussed the phishing simulation security control, which is part of regular penetration testing services provided by a third party. The simulation is usually combined with a security training and awareness program based on the result of the simulation. They reported that, while there hasn't been a successful malicious activity against the company yet, based on the increasing sophistication of malicious attacks, they believe that in every 40 attacks, one will be successful. It means that 2.5% of the email phishing attacks are likely to overcome the current security controls EMC KAL The team has found out that the company email has received phishing attacks on weekly bases, and sometimes it received more than 3 phishing emails per week. Next, the risk team moves on to gathering data about loss magnitude in the event of a breach. Sales Management Approximately 2 million customers' data are stored in C-DB; about 500.000 of them are expected to be active. - The C-DB website generates roughly $12.5M in revenue each year, with an average customer value of $400. Incident Response In the event of a breach, a team of 4-7 people would be deployed for 8-15 hours at a loaded hourly wage of $100/hr. - Industry data shows that companies typically do not discover data breaches for months after the event. Given this, Innova Tech would likely continue to operate the website during the investigation. - In the event of a data breach, a third-party forensic team would be hired to investigate how much data was stolen and how it was taken. Investigations of this scale cost an average of $200,000. After the breach, a training and awareness session has to be sent to employees who are victims of the email phishing attack. Usually, an external security consultant provides a one-day session that cost about 1500$. After the incident, notifying impacted customers will cost around $5 per customer. Notified customers are expected to contact the call center to demand more information about the breach, and each call cost about 2$. After the incident, notifying the regulator will cost around 1000$ for the whole incident Regulatory Compliance - Industry data shows that over the past 3 years, fines related to a breach of over 500,000 customer records have ranged from $150,000 to $500,000. Industry data shows that courts and regulators have rarely held companies accountable for fraudulent credit card charges that occur after a data breach. EMCS KAU Analysis Tasks: Q1: Write a properly scoped scenario statement for the analysis Innova's risk team will conduct. (10 Pts) Good Luck J Page 4 of 6 Q2: Write context-specific questions for Threat Event Frequency, Secondary Loss Event Frequency, and vulnerability. (9 Pts) Q3: What is a reasonable estimate for Threat Event Frequency given the information in the case study? Please provide minimum, maximum, most likely, and level of confidence in the most likely. Justify your estimates. (10 Pts) Q4: What is a reasonable estimate for Vulnerability given the information in the case study? Please provide a minimum, maximum, most likely, and level of confidence in the most likely. (10 Pts) Q5: What types of loss should Innova Tech consider? Circle all that apply. (9 Pts) Primary Productivity Secondary Productivity Primary Response Secondary Response Primary Competitive Secondary Competitive Advantage Advantage Primary Replacement Secondary Replacement Primary Fines/Judgments Secondary Fines/Judgments Primary Reputation Secondary Reputation EMCS KAU Q6: Use the table format below to record the calculations used to arrive at calibrated estimates ($) for each relevant type of loss. Use as many tables as you need. (15 Pts) Loss type min MI max Confidenc (add rows as necessary] Total (if needed] Q7: If there is a Secondary Loss, please use the table below to record the secondary loss event frequency? (7 Pts) Good Luck J Page 5 of 6 min MI max Secondary Loss event frequency Confidenc e 08: Insert your calibrated estimates to the FAIR-U tool and include the snapshots of the results. (30 Pts) Insert a snapshot of the FAIR ontology after inserting the relevant estimations. Insert a snapshot of primary, secondary, and total loss exposure results Insert the loss Exceedance Curve and provide informed analysis of the results KAU Part I: Problem definition Innova Tech is an enterprise software vendor located in Riyadh, Saudi Arabia, The company provides services and software solutions to satisfy the needs of organizations. Innova Tech provides its customers with business-oriented tools such as online shopping online payment, and automated balling systems Good Luck J Page 2 of 6 Ahmad, the CRO, chief risk officer, decided to update and improve reporting on the top risks facing the company. Through a series of risk identification activities, Ahmad and his cyber risk team have concluded that one of the external threats with potential high concern to the company is email phishing attacks. Through email phishing, threat actors could gain access to the company's network and possibly breach sensitive data. Ahmad and his team considered the various systems in the company and resolved that the largest risk exposure is associated with the Customer database (C-DB). The C-DB stores sensitive information about customers information purchased products, time of purchase, etc. The CRO asked the cyber risk team to investigate and conduct a risk analysis. Part II: Collecting Data & Estimates The cyber risk team held meetings with teams from across the company and obtained the following information - In the company archive, there are no documents about this type of breach occurring within the last 10 years. - There is limited knowledge of past security events and their causes because the Incident Response Team does not often perform root cause analysis on incidents. - The Network Security Team reports that they detect malicious activity on the network on average 10 times a day. They estimate that the customer website is being scanned remotely between 1 and 7 times per day. - The Application Security Team estimates that 850 connections are made to the C DB each day, and the site has not experienced an unplanned outage in the last 5 years The Security Team discussed the phishing simulation security control, which is part of regular penetration testing services provided by a third party. The simulation is usually combined with a security training and awareness program based on the result of the simulation. They reported that, while there hasn't been a successful malicious activity against the company yet, based on the increasing sophistication of malicious attacks, they believe that in every 40 attacks, one will be successful. It means that 2.5% of the email phishing attacks are likely to overcome the current security controls EMC KAL The team has found out that the company email has received phishing attacks on weekly bases, and sometimes it received more than 3 phishing emails per week. Next, the risk team moves on to gathering data about loss magnitude in the event of a breach. Sales Management Approximately 2 million customers' data are stored in C-DB; about 500.000 of them are expected to be active. - The C-DB website generates roughly $12.5M in revenue each year, with an average customer value of $400. Incident Response In the event of a breach, a team of 4-7 people would be deployed for 8-15 hours at a loaded hourly wage of $100/hr. - Industry data shows that companies typically do not discover data breaches for months after the event. Given this, Innova Tech would likely continue to operate the website during the investigation. - In the event of a data breach, a third-party forensic team would be hired to investigate how much data was stolen and how it was taken. Investigations of this scale cost an average of $200,000. After the breach, a training and awareness session has to be sent to employees who are victims of the email phishing attack. Usually, an external security consultant provides a one-day session that cost about 1500$. After the incident, notifying impacted customers will cost around $5 per customer. Notified customers are expected to contact the call center to demand more information about the breach, and each call cost about 2$. After the incident, notifying the regulator will cost around 1000$ for the whole incident Regulatory Compliance - Industry data shows that over the past 3 years, fines related to a breach of over 500,000 customer records have ranged from $150,000 to $500,000. Industry data shows that courts and regulators have rarely held companies accountable for fraudulent credit card charges that occur after a data breach. EMCS KAU Analysis Tasks: Q1: Write a properly scoped scenario statement for the analysis Innova's risk team will conduct. (10 Pts) Good Luck J Page 4 of 6 Q2: Write context-specific questions for Threat Event Frequency, Secondary Loss Event Frequency, and vulnerability. (9 Pts) Q3: What is a reasonable estimate for Threat Event Frequency given the information in the case study? Please provide minimum, maximum, most likely, and level of confidence in the most likely. Justify your estimates. (10 Pts) Q4: What is a reasonable estimate for Vulnerability given the information in the case study? Please provide a minimum, maximum, most likely, and level of confidence in the most likely. (10 Pts) Q5: What types of loss should Innova Tech consider? Circle all that apply. (9 Pts) Primary Productivity Secondary Productivity Primary Response Secondary Response Primary Competitive Secondary Competitive Advantage Advantage Primary Replacement Secondary Replacement Primary Fines/Judgments Secondary Fines/Judgments Primary Reputation Secondary Reputation EMCS KAU Q6: Use the table format below to record the calculations used to arrive at calibrated estimates ($) for each relevant type of loss. Use as many tables as you need. (15 Pts) Loss type min MI max Confidenc (add rows as necessary] Total (if needed] Q7: If there is a Secondary Loss, please use the table below to record the secondary loss event frequency? (7 Pts) Good Luck J Page 5 of 6 min MI max Secondary Loss event frequency Confidenc e 08: Insert your calibrated estimates to the FAIR-U tool and include the snapshots of the results. (30 Pts) Insert a snapshot of the FAIR ontology after inserting the relevant estimations. Insert a snapshot of primary, secondary, and total loss exposure results Insert the loss Exceedance Curve and provide informed analysis of the results

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Sound Investing Uncover Fraud And Protect Your Portfolio

Authors: Kate Mooney

1st Edition

0071481826, 9780071481823

More Books

Students also viewed these Accounting questions

Question

The payment services that FIs perform? AppendixLO1

Answered: 1 week ago

Question

b. A workshop on stress management sponsored by the company

Answered: 1 week ago