SlideShare a Scribd company logo
1. Written assignments/communication must demonstrate
professionalism, proper grammar, spelling and clarity of
communication. Assignments handwritten or single-spaced will
not be accepted. Poorly written assignments will receive a
lowered grade. Do not let the power of your ideas be affected by
poor grammar, spelling or clarity. Here are the formatting
requirements for the files:
· Must have a cover page showing the title of the paper, due
date, authors of the paper and class#
· In doc or docx format only (submissions other file formats
will receive no credit)
· Margins1”,top, bottom, right and left
· Acceptable fonts: Arial or, Times new roman
· Font color: black – Using other colors on the cover page is
allowed
· Font height: 12 pts.
· Line spacing: double
Ranking The Pairs
Team "A"
CMGT/430
September 29, 2016
Richard Zinne
Ranking The Pairs
Vulnerability
Threat
Probability
Impact
Suggested Mitigation Steps
Activity Monitoring
Security scans and Intrusion deception systems
3 (High)
3(High)
(6) Firewall and Security System monitoring will be up-to-date
and logs will be looked at once a week unless others needed
Patch levels
Unnecessary exposure to known attack vectors
3 (High)
3 (High)
(6) Use of vulnerability scanning tools to monitor unpatched
systems. A policy that includes the governance, standards and
schedule of patching. Employment of best practice patch
methods and procedures.
Insiders (poorly trained, disgruntled, malicious, negligent,
dishonest, or terminated employees)
Potentially allowing attackers to cause excessive heating,
furnace failures or frozen water pipes by manipulating
thermostat functionality.
3 (High)
3 (High)
(6) Ensure company security policy is in effect immediately
following a terminated employee.
Poor implementation of file export capability in business
enterprise software.
Asset leakage which can happen through brute force attacks and
even guesswork.
3 (High)
3 (High)
(6) Enterprise Resource Planning (ERP).
Use of session cookies to maintain state over HTTP browsers.
The cookies could be reverse engineered and leading to
attackers identifying loopholes in the logic.
2 (Med)
3(High)
(5) Store no sensitive or secure data in cookies or other headers,
insure you have an expirations time
OS command execution in function modules.
An attacker could have the ability to execute OS commands
even without authorization.
2 (Med)
3 (High)
(5) CALL 'SYSTEM'/ SAP authorizations
Door locks and padlocks from vendors like Quicklock, iBlulock,
Plantraco, Ceomate, were found to be vulnerable to password
sniffing and replay attacks.
A captured command can be replayed later to open the locks.
Giving access to Highly Secured Areas. - Loosing Critical
Information and Data within Organizational systems.
2 (Med)
3 (High)
(5) Ensure latest door lock and padlock software, along with all
drivers are updated.
Susceptibility to dust, heat and humidity
- Hardware failure
2 (Med)
3 (High)
(5) Prepare and initiate proper preventive maintenance
techniques on equipment. Properly weatherproof all locations
with IT equipment.
Data centers in geographical locations prone to natural disasters
- Full-scale service outage
2 (Med)
3 (High)
(5) Evaluate and implement measures that support Disaster
Recovery (DR) capabilities in geographical locations not prone
to natural disasters.
The use of tokens in conducting authenticated application
Profile extractions using these tokens
2 (Med)
3 (High)
(5) Enterprise IT Policy/Standard Statement
Unsecured administrative interfaces
Open attack or abuse broadsides to mission critical systems
2 (Med)
3 (High)
(5) Properly secure administrative interfaces, assign IP access
lists and install SSL certificates.
User Account Management
Restrictions on Folders,
Directories - Read or Modified
2 (Med)
3(High)
(5) Only people that need access to certain groups will have
access to files for RW modification
Insiders (poorly trained, disgruntled, malicious, negligent,
dishonest, or terminated employees
Potentially allowing attackers to cause excessive heating,
furnace failures or frozen water pipes by manipulating
thermostat functionality.
2 (Med)
3(High)
(5) Training of employees will be 6-12 months with employees
that are 1-5 years’ new hires will be trained for 6 months and
then again at end of year.
Firewalls
Access from an IP that is not blocked on network
1(Low)
3 (High)
(4) Firewalls will have the latest Firmware and will be Pen
tested regularly
Inadequate continuity planning
Extended outages and business loss
1 (Low)
3 (High)
(4) Develop a concise Business Continuity Plan (BCP) that
covers all business processes.
Access Control w/ Auditing
Un-authorization to a controlled area
2 (Med)
2 (Med)
(4) Badge employees only match with PIN access.
Violation and Security Activity Reports .
Manipulation of logs
2 (Med)
2 (Med)
(4) Logs will be checked and backed up in different locations
and more than one person will have access to them
Physical access to critical equipment (Data Center)
Damage or unauthorized access to enterprise assets
1(Low)
3 (High)
(4) Properly secured physical data center access points. The use
of NFC key cards, access lists and controlled access hours.
Default credentials on network devices
Unauthorized of unintended access to network devices
1 (Low)
3 (High)
(4) Policy and procedure regrading password policy on network
devices as well as policy or procedure for the installation that
addresses changing the default password.
Rogue access points
Unmonitored insecure network access
1 (Low)
3 (High)
(4) Port security and MAC filtering prevent rogue devices from
obtaining DHCP addresses of going outside of the port they are
attached to.
Rogue access points
Unmonitored insecure network access
1 (Low)
3 (High)
(4) Port security and MAC filtering prevent rogue devices from
obtaining DHCP addresses of going outside of the port they are
attached to.
Wheelchair Technology
A wheelchair from an unknown vendor had a vulnerability that
could be exploited to disable a safety feature and take control of
the device. Using technology in highly populated areas, and
hacking medical devices etc.
1 (Low)
3 (High)
(4) Configure security settings on wheelchair technology to
prevent access.
Social engineering attacks.
Employees are a weak link that can be exploited. They could
click on infected links and download infected files. They could
infect computer systems or even create backdoors that could be
used later to access the company networks
3 (High)
1 (Low)
(4) Install anti-virus software, firewalls, email filters and keep
these up-to-date. Set your operating system to automatically
update, and if your smartphone doesn’t automatically update,
manually update it whenever you receive a notice to do so. Use
an anti-phishing tool offered by your web browser or third party
to alert you to risks.
Inadequate video surveillance (internal)
- Internal threats; stolen secrets or product; physical activities
not reviewable
1 (Low)
2 (Med)
(3) Implement surveillance cameras in all locations holding
products or sensitive equipment.
Inadequate video surveillance (external)
- External threats; competitor surveillance; staff safety;
physical activities not reviewable
1 (Low)
1 (Low)
(2) Implement surveillance cameras covering entrance and exit
points, as well as early/late staff parking.
Compromise of user credentials due to inadequate user training.
Damage to the CIA triad
2 (Med)
1 (Low)
(3) Proper role based access and adequate user training will
prevent or significantly limit the impact of this threat.
Overlooking non-traditional IP devices I.E. building controls,
POS, medical equipment
Unsecured unmonitored devices on the network
1 (Low)
1 (Low)
(2) Ensuring that non-essential building controls or equipment
resides on its own physical and logical network.
Thermostat Vulnerability
A thermostat from Trane used a weak plain text protocol.
- Potentially allowing attackers to cause excessive heating,
furnace failures or frozen water pipes by manipulating
thermostat functionality.
1 (Low)
2 (Med)
(3) Secure capabilities of thermostat functionality via plain text
protocol.
Running head: RANKING THE PAIRS
1
RANKING THE PAIRS
4
Running head:
RANKING THE
PAIRS
1
Ranking The
Pairs
Team "A"
CMGT/430
September 29
, 2016
Richard Zinne
Running head: RANKING THE PAIRS 1
Ranking The Pairs
Team "A"
CMGT/430
September 29, 2016
Richard Zinne

More Related Content

DOCX
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
PPT
Cyber crime with privention
PPTX
Top Cybersecurity Challenges Facing Your Business
PPTX
Attacker scenarios and threats description.pptx
PPTX
Enterprise IT Security| CIO Innovation and Leadership
DOCX
Part 3 ApplicationEnd-User Security Recommendations.docx
PPTX
Presentation1 A.pptx
PPTX
Tsc2021 cyber-issues
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
Cyber crime with privention
Top Cybersecurity Challenges Facing Your Business
Attacker scenarios and threats description.pptx
Enterprise IT Security| CIO Innovation and Leadership
Part 3 ApplicationEnd-User Security Recommendations.docx
Presentation1 A.pptx
Tsc2021 cyber-issues

Similar to 1. Written assignmentscommunication must demonstrate professional.docx (20)

PDF
BEST CYBER SECURITY PRACTICES
PDF
IS Risk Assessment example
PPTX
HIPAA Safeguard Slides
DOCX
Policy for PDO
PDF
Information Security Risk Management
PPT
Guard Era Security Overview Preso (Draft)
PDF
Azstec cyber-security-workbook
PPTX
Privacies are Coming
PPTX
A guide to Sustainable Cyber Security
PDF
Ch08 8 Information Security Process it-slideshares.blogspot.com
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
DOCX
Discuss how a successful organization should have the followin.docx
DOCX
Discuss how a successful organization should have the followin.docx
PDF
Optimizing The Healthcare Stack for Performance_Protected Harbor eBook
PPTX
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
PPTX
Critical Controls Of Cyber Defense
DOCX
Cst 630Education Specialist / snaptutorial.com
PDF
CIA-Triad-Presentation.pdf
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
PPTX
Privacies are coming
BEST CYBER SECURITY PRACTICES
IS Risk Assessment example
HIPAA Safeguard Slides
Policy for PDO
Information Security Risk Management
Guard Era Security Overview Preso (Draft)
Azstec cyber-security-workbook
Privacies are Coming
A guide to Sustainable Cyber Security
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
Optimizing The Healthcare Stack for Performance_Protected Harbor eBook
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Critical Controls Of Cyber Defense
Cst 630Education Specialist / snaptutorial.com
CIA-Triad-Presentation.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
Privacies are coming

More from paynetawnya (20)

DOCX
YThis paper is due Monday, 30 November. You will need to use at leas.docx
DOCX
You  have spent a lot of time researching a company.  Would you inve.docx
DOCX
ZXY Corporation has relocated to a new building that was wired and s.docx
DOCX
Zero Describe the system (briefly!).  As in I’m going to talk ab.docx
DOCX
Youre the JudgeThis week, you are a judge in a federal district c.docx
DOCX
Your Week 2 collaborative discussion and the Ch. 2 of Introduction.docx
DOCX
Your thesis statement will explain the ambiguity of why Prince hal b.docx
DOCX
Your textbook states that body image—how a person believes heshe .docx
DOCX
Your textbook discusses various cultural models in terms of immigrat.docx
DOCX
Your team has been given the land rights to an abandoned parcel of.docx
DOCX
Your supervisor, Ms. Harris, possesses a bachelors of social work (.docx
DOCX
Your RatingGroup DiscussionDelinquency Prevention Please .docx
DOCX
Your report due in Week 6 requires you to look at tools of liquidity.docx
DOCX
Your Project Sponsor pulls you aside and admits that he has no idea .docx
DOCX
Your progress on the project thus far. Have you already compiled i.docx
DOCX
Week 6 - Discussion 1Evaluate the characteristics of each mode o.docx
DOCX
WEEK 5 – EXERCISES Enter your answers in the spaces pr.docx
DOCX
Week 5 Writing Assignment (Part 2) Outline and Preliminary List o.docx
DOCX
Week 5 eActivityRead the Recommendation for Cryptographic Key.docx
DOCX
Week 5 DiscussionNetwork SecuritySupporting Activity Netw.docx
YThis paper is due Monday, 30 November. You will need to use at leas.docx
You  have spent a lot of time researching a company.  Would you inve.docx
ZXY Corporation has relocated to a new building that was wired and s.docx
Zero Describe the system (briefly!).  As in I’m going to talk ab.docx
Youre the JudgeThis week, you are a judge in a federal district c.docx
Your Week 2 collaborative discussion and the Ch. 2 of Introduction.docx
Your thesis statement will explain the ambiguity of why Prince hal b.docx
Your textbook states that body image—how a person believes heshe .docx
Your textbook discusses various cultural models in terms of immigrat.docx
Your team has been given the land rights to an abandoned parcel of.docx
Your supervisor, Ms. Harris, possesses a bachelors of social work (.docx
Your RatingGroup DiscussionDelinquency Prevention Please .docx
Your report due in Week 6 requires you to look at tools of liquidity.docx
Your Project Sponsor pulls you aside and admits that he has no idea .docx
Your progress on the project thus far. Have you already compiled i.docx
Week 6 - Discussion 1Evaluate the characteristics of each mode o.docx
WEEK 5 – EXERCISES Enter your answers in the spaces pr.docx
Week 5 Writing Assignment (Part 2) Outline and Preliminary List o.docx
Week 5 eActivityRead the Recommendation for Cryptographic Key.docx
Week 5 DiscussionNetwork SecuritySupporting Activity Netw.docx

Recently uploaded (20)

PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Trump Administration's workforce development strategy
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Weekly quiz Compilation Jan -July 25.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Orientation - ARALprogram of Deped to the Parents.pptx
Final Presentation General Medicine 03-08-2024.pptx
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
Computing-Curriculum for Schools in Ghana
Microbial disease of the cardiovascular and lymphatic systems
Trump Administration's workforce development strategy
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Practical Manual AGRO-233 Principles and Practices of Natural Farming
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Paper A Mock Exam 9_ Attempt review.pdf.
Module 4: Burden of Disease Tutorial Slides S2 2025
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
01-Introduction-to-Information-Management.pdf
What if we spent less time fighting change, and more time building what’s rig...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx

1. Written assignmentscommunication must demonstrate professional.docx

  • 1. 1. Written assignments/communication must demonstrate professionalism, proper grammar, spelling and clarity of communication. Assignments handwritten or single-spaced will not be accepted. Poorly written assignments will receive a lowered grade. Do not let the power of your ideas be affected by poor grammar, spelling or clarity. Here are the formatting requirements for the files: · Must have a cover page showing the title of the paper, due date, authors of the paper and class# · In doc or docx format only (submissions other file formats will receive no credit) · Margins1”,top, bottom, right and left · Acceptable fonts: Arial or, Times new roman · Font color: black – Using other colors on the cover page is allowed · Font height: 12 pts. · Line spacing: double Ranking The Pairs Team "A" CMGT/430 September 29, 2016 Richard Zinne Ranking The Pairs
  • 2. Vulnerability Threat Probability Impact Suggested Mitigation Steps Activity Monitoring Security scans and Intrusion deception systems 3 (High) 3(High) (6) Firewall and Security System monitoring will be up-to-date and logs will be looked at once a week unless others needed Patch levels Unnecessary exposure to known attack vectors 3 (High) 3 (High) (6) Use of vulnerability scanning tools to monitor unpatched systems. A policy that includes the governance, standards and schedule of patching. Employment of best practice patch methods and procedures. Insiders (poorly trained, disgruntled, malicious, negligent, dishonest, or terminated employees) Potentially allowing attackers to cause excessive heating, furnace failures or frozen water pipes by manipulating thermostat functionality. 3 (High) 3 (High) (6) Ensure company security policy is in effect immediately following a terminated employee.
  • 3. Poor implementation of file export capability in business enterprise software. Asset leakage which can happen through brute force attacks and even guesswork. 3 (High) 3 (High) (6) Enterprise Resource Planning (ERP). Use of session cookies to maintain state over HTTP browsers. The cookies could be reverse engineered and leading to attackers identifying loopholes in the logic. 2 (Med) 3(High) (5) Store no sensitive or secure data in cookies or other headers, insure you have an expirations time OS command execution in function modules. An attacker could have the ability to execute OS commands even without authorization. 2 (Med) 3 (High) (5) CALL 'SYSTEM'/ SAP authorizations Door locks and padlocks from vendors like Quicklock, iBlulock, Plantraco, Ceomate, were found to be vulnerable to password sniffing and replay attacks. A captured command can be replayed later to open the locks. Giving access to Highly Secured Areas. - Loosing Critical Information and Data within Organizational systems. 2 (Med) 3 (High) (5) Ensure latest door lock and padlock software, along with all drivers are updated. Susceptibility to dust, heat and humidity - Hardware failure 2 (Med)
  • 4. 3 (High) (5) Prepare and initiate proper preventive maintenance techniques on equipment. Properly weatherproof all locations with IT equipment. Data centers in geographical locations prone to natural disasters - Full-scale service outage 2 (Med) 3 (High) (5) Evaluate and implement measures that support Disaster Recovery (DR) capabilities in geographical locations not prone to natural disasters. The use of tokens in conducting authenticated application Profile extractions using these tokens 2 (Med) 3 (High) (5) Enterprise IT Policy/Standard Statement Unsecured administrative interfaces Open attack or abuse broadsides to mission critical systems 2 (Med) 3 (High) (5) Properly secure administrative interfaces, assign IP access lists and install SSL certificates. User Account Management Restrictions on Folders, Directories - Read or Modified 2 (Med) 3(High) (5) Only people that need access to certain groups will have access to files for RW modification Insiders (poorly trained, disgruntled, malicious, negligent, dishonest, or terminated employees Potentially allowing attackers to cause excessive heating, furnace failures or frozen water pipes by manipulating
  • 5. thermostat functionality. 2 (Med) 3(High) (5) Training of employees will be 6-12 months with employees that are 1-5 years’ new hires will be trained for 6 months and then again at end of year. Firewalls Access from an IP that is not blocked on network 1(Low) 3 (High) (4) Firewalls will have the latest Firmware and will be Pen tested regularly Inadequate continuity planning Extended outages and business loss 1 (Low) 3 (High) (4) Develop a concise Business Continuity Plan (BCP) that covers all business processes. Access Control w/ Auditing Un-authorization to a controlled area 2 (Med) 2 (Med) (4) Badge employees only match with PIN access. Violation and Security Activity Reports . Manipulation of logs 2 (Med) 2 (Med) (4) Logs will be checked and backed up in different locations and more than one person will have access to them Physical access to critical equipment (Data Center) Damage or unauthorized access to enterprise assets 1(Low) 3 (High) (4) Properly secured physical data center access points. The use of NFC key cards, access lists and controlled access hours.
  • 6. Default credentials on network devices Unauthorized of unintended access to network devices 1 (Low) 3 (High) (4) Policy and procedure regrading password policy on network devices as well as policy or procedure for the installation that addresses changing the default password. Rogue access points Unmonitored insecure network access 1 (Low) 3 (High) (4) Port security and MAC filtering prevent rogue devices from obtaining DHCP addresses of going outside of the port they are attached to. Rogue access points Unmonitored insecure network access 1 (Low) 3 (High) (4) Port security and MAC filtering prevent rogue devices from obtaining DHCP addresses of going outside of the port they are attached to. Wheelchair Technology A wheelchair from an unknown vendor had a vulnerability that could be exploited to disable a safety feature and take control of the device. Using technology in highly populated areas, and hacking medical devices etc. 1 (Low) 3 (High) (4) Configure security settings on wheelchair technology to prevent access. Social engineering attacks. Employees are a weak link that can be exploited. They could click on infected links and download infected files. They could infect computer systems or even create backdoors that could be used later to access the company networks 3 (High)
  • 7. 1 (Low) (4) Install anti-virus software, firewalls, email filters and keep these up-to-date. Set your operating system to automatically update, and if your smartphone doesn’t automatically update, manually update it whenever you receive a notice to do so. Use an anti-phishing tool offered by your web browser or third party to alert you to risks. Inadequate video surveillance (internal) - Internal threats; stolen secrets or product; physical activities not reviewable 1 (Low) 2 (Med) (3) Implement surveillance cameras in all locations holding products or sensitive equipment. Inadequate video surveillance (external) - External threats; competitor surveillance; staff safety; physical activities not reviewable 1 (Low) 1 (Low) (2) Implement surveillance cameras covering entrance and exit points, as well as early/late staff parking. Compromise of user credentials due to inadequate user training. Damage to the CIA triad 2 (Med) 1 (Low) (3) Proper role based access and adequate user training will prevent or significantly limit the impact of this threat. Overlooking non-traditional IP devices I.E. building controls, POS, medical equipment Unsecured unmonitored devices on the network 1 (Low) 1 (Low) (2) Ensuring that non-essential building controls or equipment resides on its own physical and logical network.
  • 8. Thermostat Vulnerability A thermostat from Trane used a weak plain text protocol. - Potentially allowing attackers to cause excessive heating, furnace failures or frozen water pipes by manipulating thermostat functionality. 1 (Low) 2 (Med) (3) Secure capabilities of thermostat functionality via plain text protocol. Running head: RANKING THE PAIRS 1 RANKING THE PAIRS 4 Running head: RANKING THE PAIRS 1
  • 9. Ranking The Pairs Team "A" CMGT/430 September 29 , 2016 Richard Zinne Running head: RANKING THE PAIRS 1 Ranking The Pairs Team "A" CMGT/430 September 29, 2016 Richard Zinne