Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Memorandum about: Any additional vulnerabilities or weaknesses that may currently be in place affecting FA2. Any additional threat-sources that can trigger the vulnerabilities or weaknesses

image text in transcribed

Memorandum about:

  • Any additional vulnerabilities or weaknesses that may currently be in place affecting FA2.
  • Any additional threat-sources that can trigger the vulnerabilities or weaknesses you just identified for FA2
  • Any additional risks or situations involving exposure to loss for the financial information in FA2
  • Any additional controls or procedures that should be implemented to mitigate the risks just identified

image text in transcribedimage text in transcribed
1:50 Student AA feueduph-my.sharepoint.com C 1 of 1 X O periodic change, password history, lockout threshold, and complexity. Likelihood Determination Impact Impact Financial IT Area / Likelihood Probability | Magnitude Level Risk Recommended Action Application | Vulnerability Threat Source Level Assigned of Impact Value Risk Rating Control Priority Financial Information Unauthorized Very High 1.00 High 75 Users possess 75 User access Very Application Security / FA2 users privileges that privileges within High #2 (FA2) owners do not (hackers, are not FA2 are periodically terminated consistent with periodically review user employees, their job reviewed by access privileges. and insiders) functions, application allowing owners to verify unauthorized or access privileges incorrect remain modifications to appropriate and FA2's data, which consistent with could cause job requirements management decisions based upon misleading information. Information Unauthorized Very High 1.00 High 75 Terminated users 75 The security Very Security / users can gain access to administrator is High Terminated user (terminated FAZ and view or notified of accounts are not employees) modify its employees who removed from financial have been FA2. information. terminated. Access privileges of such employees are immediately changed to reflect their new status. Likelihood Determination Impact Impact Financial IT Area / Likelihood Probability Magnitude Level Risk Recommended Action Application Vulnerability Threat Source |Level Assigned of Impact Value | Risk Rating' Control Priority Change Control Unauthorized Low 0.25 High 75 FA2 changes are 18.75 Changes to FAZ Low Management / application not properly are tested and Test results for changes and authorized. approved by FA2 upgrades modifications Implementation management are not approved of such changes prior to their by management, could result in implementation prior to their invalid or in production in implementation misleading data. accordance with into production. test plans and results. Computed by multiplying the "Probability Assigned" and the "Impact Level Value."

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Financial and Managerial Accounting

Authors: Belverd E. Needles, Marian Powers, Susan V. Crosson

9th edition

1439037809, 978-1439037805

More Books

Students also viewed these Accounting questions

Question

6. What information processes operate in communication situations?

Answered: 1 week ago

Question

3. How can we use information and communication to generate trust?

Answered: 1 week ago