Global Finance, Inc. - 76581

Request Posted by
gomo

gomo

Rating : No Rating
Earned: $0
Request Detail
Price: $8
  • From: Computer Science, PHP
  • Due on: Fri 13 Mar, 2015 (03:22pm)
  • Asked on: Wed 11 Mar, 2015
  • Due date has passed, but you can still Post Solution.
Description
  • The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has experienced DoS network attacks twice this year, and its Oracle database and email servers had been down for a total of one (1) week as a result. The recovery process required GFI to utilize $25,000 to restore its operations to the normal operating baseline. GFI estimated the loss from these network attacks at more than $1,000,000, as well as lost customer confidence.

Write an eight to ten (8-10) page formal risk assessment proposal in which you:

  1. Describe the company network, interconnection, and communication environment.
  2. Assess risk based on the GFI, Inc. network diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will utilize this risk assessment to determine what actions to take; therefore, it must be comprehensive for the business leaders to make data-driven decisions.
    1. Defend your assumptions where pertinent information from the scenario isn’t available.
    2. Ascertain apparent security vulnerabilities, and analyze at least three (3) such vulnerabilities. Such analysis should entertain the possibility of faulty network design. Recommend mitigation processes and procedures for each of the identified vulnerabilities.
    3. Justify your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions.
  3. Examine whether your risk assessment methodology is quantitative, qualitative, or a combination of these, and discuss the main reasons why you believe that the methodology that you utilized was the most appropriate.
  4. Explain the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration.
  5. Using Microsoft Visio or its open source equivalent, redraw the CFI diagram, depicted as a secure and risk-mitigating model.
Attachments
Doc2.docx
Doc2.docx
2 Solution for Global Finance, Inc.
Title Price Category solution By purchased  
GLOBAL FINANCE, inc
$5.00 Computer Science, PHP vikass 0 time(s)
Global Finance__
$8.00 Mathematics, Algebra Maxim 0 time(s)
Please Login or Register to Submit the Solution for the Request