Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Study the scenario and complete the questions that follow: Risk Management As part of their ongoing efforts to strengthen their security posture, SecureTech Solutions has
Study the scenario and complete the questions that follow:
Risk Management
As part of their ongoing efforts to strengthen their security posture, SecureTech Solutions has initiated a comprehensive risk assessment to identify and prioritize vulnerabilities within their IT infrastructure.
The following assets have been identified as essential to the company's operations and require thorough evaluation to determine their risk ratings and prioritize mitigation efforts.
Assets:
Customer Database Asset Value: High
Vulnerability : Lack of Encryption Customer data is stored in plain text format which has likelihood of when compromised.
Vulnerability : Weak Access Controls Insufficient restrictions on who can access the database, the manager believes there is a chance of success of a data breach success.
The database has an impact rating of and has no current controls in place. The manager is percent certain of the assumptions and data.
Development Servers Asset Value: Medium
Vulnerability : Inadequate Patch Management Patch updates are not regularly applied, leaving servers vulnerable to known exploits.
The likelihood of that attack on the development server is estimated at The server has been assigned an impact value of and assuming an update can be installed that reduces the impact of the vulnerability by percent. You are percent certain of the assumptions and data.
Source Code Repository Asset Value: High
Vulnerability : Insecure Authentication Weak password policies and lack of multifactor authentication.
Estimates show the likelihood of information theft is There are no controls in place on this asset; it has an impact rating of You are percent certain of the assumptions and data.
Source: William, J :
Perform a comprehensive risk assessment by identifying potential risks associated with each vulnerability and provide actionable insights and recommendations to mitigate these risks effectively.
marks
a Using Risk rating calculation to prioritize the vulnerabilities. Calculate the risk rating for each vulnerability. Show all your calculation
marks
b Which vulnerability should be evaluated first for additional controls? Show all your calculation
marks
c Which should be evaluated last?
marks
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started