Posted: January 28th, 2023
Project 2 Scenario
Assessing Information System Vulnerabilities and Risk
You are an information assurance management officer (IAMO) at an organization of your choosing. One morning, as you’re getting ready for work, you see an email from Karen, your manager. She asks you to come to her office as soon as you get in. When you arrive to your work, you head straight to Karen’s office. “Sorry for the impromptu meeting,” she says, “but we have a bit of an emergency. There’s been a security breach at the Office of Personnel Management.”
We don’t know how this happened, but we need to make sure it doesn’t happen again, says Karen. You’ll be receiving an email with more information on the security breach. Use this info to assess the information system vulnerabilities of the Office of Personnel Management.
At your desk, you open Karen’s email. She’s given you an OPM report from the Office of the Inspector General, or OIG. You have studied the OPM OIG report and found that the hackers were able to gain access through compromised credentials. The security breach could have been prevented if the Office of Personnel Management, or OPM, had abided by previous auditing reports and security findings. In addition, access to the databases could have been prevented by implementing various encryption schemas and could have been identified after running regularly scheduled scans of the systems.
Karen and the rest of the leadership team want you to compile your findings into a Security Assessment Report, or SAR. You will also create a Risk Assessment Report, or RAR, in which you identify threats, vulnerabilities, risks, and likelihood of exploitation and suggested remediation.
Project 2 Scenario
Assessing Information System Vulnerabilities and Risk
You are an information assurance management officer (IAMO) at an organization of your choosing. One morning, as you’re getting ready for work, you see an email from Karen, your manager. She asks you to come to her office as soon as you get in. When you arrive to your work, you head straight to Karen’s office. “Sorry for the impromptu meeting,” she says, “but we have a bit of an emergency. There’s been a security breach at the Office of Personnel Management.”
We don’t know how this happened, but we need to make sure it doesn’t happen again, says Karen. You’ll be receiving an email with more information on the security breach. Use this info to assess the information system vulnerabilities of the Office of Personnel Management.
At your desk, you open Karen’s email. She’s given you an OPM report from the Office of the Inspector General, or OIG. You have studied the OPM OIG report and found that the hackers were able to gain access through compromised credentials. The security breach could have been prevented if the Office of Personnel Management, or OPM, had abided by previous auditing reports and security findings. In addition, access to the databases could have been prevented by implementing various encryption schemas and could have been identified after running regularly scheduled scans of the systems.
Karen and the rest of the leadership team want you to compile your findings into a Security Assessment Report, or SAR. You will also create a Risk Assessment Report, or RAR, in which you identify threats, vulnerabilities, risks, and likelihood of exploitation and suggested remediation.
Project 2 Instructions
The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls).
The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements in order to stay in step with ever-changing information system technologies.
The data breach at the US Office of Personnel Management (OPM) was one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector. Some failures of security practices, such as lack of diligence with security controls and management of changes to the information systems infrastructure, were cited as contributors to the massive data breach in the OPM Office of the Inspector General’s (OIG) Final Audit Report, which can be found in open-source searches.
Some of the findings in the report include:
· weak authentication mechanisms;
· lack of a plan for life-cycle management of the information systems;
· lack of a configuration management and change management plan;
· lack of inventory of systems, servers, databases, and network devices;
· lack of mature vulnerability scanning tools;
· lack of valid authorizations for many systems; and
· lack of plans of action to remedy the findings of previous audits.
The breach ultimately resulted in removal of OPM’s top leadership. The impact of the breach on the livelihoods of millions of people may never be fully known.
There is a critical need for security programs that can assess vulnerabilities and provide mitigations.
In this project, there are eight steps, including a lab, that will help you create your final deliverables. The deliverables for this project are as follows:
1. Security Assessment Report (SAR): This should be an eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
2. Risk Assessment Report (RAR): This report should be a five- to six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Step1: Enterprise Network Diagram
In this project, you will research and learn about types of networks and their secure constructs that may be used in an organization to accomplish the functions of the organization’s mission.
You will propose a local area network (LAN) and a wide area network (WAN) for the organization, define the systems environment, and incorporate this information in a network diagram. You will discuss the security benefits of your chosen network design.
Read the following resources about some of the computing platforms available for networks and discuss how these platforms could be implemented in your organization:
Common Computing Platforms
Computing platforms have three main components: hardware, the operating system (OS), and applications. The hardware is the physical equipment/machine that runs the OS and applications. It generally consists of the central processing unit (CPU) or processor, storage, and memory. The operating system (OS) communicates between the hardware and the applications run by the end user.
Different platforms are used for traditional desktops and laptops and the new touchscreen phones and tablets. Common processors include Intel Core and AMD (for desktops) and ARM (modified by Apple and Qualcomm to make processors for phones). The most popular operating systems for desktops are Windows and Linux, and for phones, are iOS and Android.
Compatible applications are developed for specific systems by different companies, including Microsoft, Apple, Google, and Adobe.
The Hardware Cloud: Utility Computing and Its Cousins
Learning Objectives
1. Distinguish between SaaS and hardware clouds.
2. Provide examples of firms and uses of hardware clouds.
3. Understand the concepts of cloud computing, cloudbursting, and black swan events.
4. Understand the challenges and economics involved in shifting computing hardware to the cloud.
While SaaS provides the software and hardware to replace an internal information system, sometimes a firm develops its own custom software but wants to pay someone else to run it for them. That’s where hardware clouds, utility computing, and related technologies come in. In this model, a firm replaces computing hardware that it might otherwise run on-site with a service provided by a third party online. While the term utility computing was fashionable a few years back (and old timers claim it shares a lineage with terms like hosted computing or even time sharing), now most in the industry have begun referring to this as an aspect of cloud computing, often referred to as hardware clouds. Computing hardware used in this scenario exists “in the cloud,” meaning somewhere on the Internet. The costs of systems operated in this manner look more like a utility bill—you only pay for the amount of processing, storage, and telecommunications used. Tech research firm Gartner has estimated that 80 percent of corporate tech spending goes toward data center maintenance. J. Rayport, “Cloud Computing Is No Pipe Dream,” BusinessWeek, December 9, 2008. Hardware-focused cloud computing provides a way for firms to chip away at these costs.
Major players are spending billions building out huge data centers to take all kinds of computing out of the corporate data center and place it in the cloud. While cloud vendors typically host your software on their systems, many of these vendors also offer additional tools to help in creating and hosting apps in the cloud. Salesforce.com offers Force.com, which includes not only a hardware cloud but also several cloud-supporting tools, such as a programming environment (IDE) to write applications specifically tailored for Web-based delivery. Google’s App Engine offers developers several tools, including a database product called Big Table. And Microsoft offers a competing product—Windows Azure that runs the SQL Azure database. These efforts are often described by the phrase platform as a service (PaaS) since the cloud vendor provides a more complete platform (e.g., hosting hardware, operating system, database, and other software), which clients use to build their own applications.
Another alternative is called infrastructure as a service (IaaS). This is a good alternative for firms that want even more control. In IaaS, clients can select their own operating systems, development environments, underlying applications like databases, or other software packages (i.e., clients, and not cloud vendors, get to pick the platform), while the cloud firm usually manages the infrastructure (providing hardware and networking). IaaS services are offered by a wide variety of firms, including Amazon, Rackspace, Oracle, Dell, HP, and IBM.
Project 2 – Assessing Information System Vulnerabilities and Risk
Security Assessment Report (SAR)
CST 610: Cyberspace and Cybersecurity Foundations
{Your Name}
[date]
Professor\– Section
University
TISTA Science & Technology CorporationScience and Technology
[Period of Assessment]
[Report Date]
1. Background
2. Assessment Approach
[You have been asked whether the OPM breach could happen at your company. Describe the approach to your assessment based on the security posture of your company from the above description and the lab testing and comparing that to the threats encountered in the OPM breach.]
Threat | Synopsis | Impact[footnoteRef:2] [2: Quantify or provide recent relevant examples or incidents of business, safety, health… impact.] |
Threat | Synopsis | Impact2 | Impact Level (H,M,L) |
Vulnerability | Synopsis | Impact2 | Impact Level (H,M,L) |
ID[footnoteRef:4] [4: ID: You may wish to label categories as S=System, N=Network, I=Interface, D=Data or Information and give number in each category (e.g., S1, S2, N1, D1) for unambiguous referencing.] | Impact Level (H,M,L) | Threat or Vulnerability1 | Current Security Posture | Deficiencies in Current Posture |
______________________________ _________________
Principle Assessor Date
[Enter your name and date as would be done in a real SAR.]
Provide your summary list of references using proper APA format. (Remember: You must also use in-line citations with proper APA format throughout the report.)
APPENDICES
Place your lab report and screenshots here.
[The lab is to be treated as your specific testing and checking out of your company’s critical information systems and the topics you are writing about. It is not a theoretical exercise. Nor is it independent of and separate from our topic and scenario. Provide screenshots of the tools and results from your lab experiences, as well as answer any lab questions. Many students take the lab directions, eliminate everything but the section headings and questions and in each section write down what was asked for, what the results would show, how they relate to a topic in the main report, enter the screenshots obtained and point to or write out the specific key data result(s) within the screenshot.
Your specific insights, comparisons and results from the analysis of the lab data should be identified and used within the report and tables, above.
Note: A great tool for capturing your screenshots from the lab is MS SnipIt which is installed on MS Windows computers.]
Page 5 of 6
SOLUTION
Information systems vulnerabilities refer to weaknesses in the design, implementation, or management of a system that can be exploited by attackers to gain unauthorized access, steal sensitive information, or disrupt system operations. Risk assessment is the process of identifying, evaluating, and prioritizing these vulnerabilities to determine the level of risk to the organization.
This process typically involves identifying potential threats, assessing the likelihood of those threats occurring, and determining the potential impact to the organization if a threat were to materialize. Once risks have been identified and assessed, appropriate controls can be implemented to mitigate or eliminate the risks. This process should be ongoing and regularly reviewed and updated to ensure that risks are identified and addressed in a timely manner.
Place an order in 3 easy steps. Takes less than 5 mins.