Given the information presented in Lesson 1 and the materials from “Assignment: Executive Summary on Risk Analysis,” your task for this assignment is to:
Required ResourcesMaterials from Assignment: Executive Summary on Risk AnalysisSubmission Requirements
Evaluation Criteria and Rubric
|Privacy Data Impact||Assessment
(Critical, Major- minor)
|Administration Server||Systems/Application Domain||FERPA||Critical||$10,000|
|Student’s Server||Systems/Application Domain||FERPA||Critical||$10,000|
|Administration Staff and Teacher’s Desktop Computers||Workstation Domain||FERPA||Critical||$5,000|
|Principal Notebook Computer||Workstation Domain||FERPA||Critical||$1,500|
|Computer Lab Desktops||Workstation Domain||FERPA||Minor||$5,000|
|Student’s Laptops||Workstation Domain||FERPA||Major||$1,000|
|Network Access (Wired / Wireless)||Lan – Wan Domain||FERPA||Major||$5,000|
|Users (Students and Staff)||User Domain||FERPA||Critical|
PURPOSE OF ANALYSIS
Having analyzed the school’s assets, Ashton Symonds, the principal, drafted an asset list that prioritizes each school’s assets based on how much protection each requires. An analysis of risks has the following objectives:
· To protect the schools’ critical assets
· To prepare an asset list and prioritize the assets based on their importance to the function of the school.
SCOPE OF ANALYSIS
A risk analysis of the school’s critical assets, such as servers and network infrastructure was conducted. However, the scope did not include buildings and facilities. The documentation that we leveraged to assist in the risk analysis from the school included;
· Previous risk assessment Report
· Internal controls that were relevant to this assessment
During the risk analysis, the following steps were used to analyze the schools’ system.
· We combined a list of all the resources that were critical to the school and accompanied it with a brief description of its business value to the school
· By using a series of different techniques to test the system, we identified all the vulnerabilities of the critical resources and included a description of the weakness and how this weakness could affect the school and finally, we had the threats categorized.
· A severity and likelihood rating was done on the threats and a final rating was done based on the CIA triad. The confidentiality (Schaefer et al 2018), integrity, and availability needs of each critical resource.
· For every risk that we identified we recommended an action that would bring the risks into an acceptable range of exposure.
The following assessment was taken,
· The schools’ computers were identified and their business value documented.
· Based on the criticality of the resources the computers were elevated using Confidentiality, Integrity, Availability, and Accountability individual aspects (Livraga & Viviani 2019).
· The most likely and severe risk exposure were identified, and this data used to determine the overall risk exposure
· The ratings on the risk were used to determine recommended safeguards that eventually led to the formation of risking mitigation strategies.
Information exposure by weak authentic that risked the security of the schools’ data. The users should be trained on the importance of security and having secure passwords in place.
Remote access vulnerabilities due to user’s access of data over the internet to the server. there should be malware installed and antivirus installed to ensure safety during the wireless connections.
Unlocked workstations or user machines could lead to the manipulation of data by unauthorized users. Workstations should always be shut down when not in use. Users need to be taught and aware of the importance of data security.
The servers are the most important based on their ability to store the schools’ data, the teachers’ workstations are next as they enable teachers to perform data entry and the rest follow in the order of necessity to everyday use.
Livraga, G., & Viviani, M. (2019, November). Data confidentiality and information credibility in online ecosystems. In Proceedings of the 11th International Conference on Management of Digital EcoSystems (pp. 191-198).
Schaefer, I., Runge, T., Knüppel, A., Cleophas, L., Kourie, D., & Watson, B. W. (2018, November). Towards confidentiality-by-construction. In International Symposium on Leveraging Applications of Formal Methods (pp. 502-515). Springer, Cham.
US Department of Education (ED). (2021, August 25). Family educational rights and Privacy act (ferpa). Home. https://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html.
Why Work with Us
Top Quality and Well-Researched Papers
Our writers have been trained on how to handle papers placed by our clients. The writer must read and understand before embarking on writing the papers. In case of any issue that needs clarification, writers are encouraged to ask the client or support.
Professional and Experienced Academic Writers
Our team comprises of the best writers and editors. We do thorough vetting during recruitment to make sure that our writers have the knowledge and experience we aspire in the team.
Free Unlimited Revisions
Our aim is to give the client the best outcome. If for some reason you are not satisfied with the wok done, you can ask the paper to be revised or rewritten. This will be done to your satisfaction with no extra charges.
Prompt Delivery and 100% Money-Back-Guarantee
We have writers who work round the clock. This helps in making sure that all our clients’ papers are delivered on time. If we have issues with the deadline, we will ask for extension. If its not possible, the money is fully refunded.
Original & Confidential
Our clients’ confidentiality is highly respected. We can never disclose our clients’ details to third parties. In the same regard, we strive to give our clients 100% original papers. We do not tolerate plagiarism from our writers.
24/7 Customer Support
Clients can reach us any time of the day, and any day of the week. There is a live chat, email or phone numbers to help in ease of communication.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
You should never be worried about your papers even in the middle of the night. Our team will work round the clock to deliver.
We have an able team that can deliver your work in the shortest time possible. The academic level or the type of work should never be a hindrance. Our highly competent support team is always around (24/7) to give you any assistance you may need.
Admission Essays & Business Writing Help
Do you need to be admitted in your dream institution but find it challenging to write an admission essay? Our team is in a position to write the best letter that will guarantee you an admission. We do as well write the best business proposals and reports.
Writing can be fun and enjoyable when everything has been done right. Writing is not just enough without proper editing and proofreading. We have a team of editors that ensure everything falls in place, whether its issues to do with grammar or referencing styles.
Once the paper has been done and submitted, that is not the end of it. You can always ask for amendment or improvement if you feel something has not been done right. Our team of writers and editors will gladly assist you to your satisfaction. Revision is free of charge.