Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Octave allegro risk assessment template

04/12/2021 Client: muhammad11 Deadline: 2 Day

ISE 510 Security Risk Analysis & Plan

Security Breach Analysis and Recommendations

Milestone 2: Test Plan

Due

Submitted on

If late let me know why:

=====================================

Delete these instructions in blue font before submission:

Change file name to MS#2_LAST_FIRST

A few comments up front:

Assume you and your team are hired by Limetree as an IT Security consultant to analyze the breach, determine the vulnerabilities, and make recommendations for an extensive security program to include policies, controls, enforcement of controls, and continuous monitoring, all for the purpose of reducing information system risk to an acceptable level.

You will need to look up ONE of the Risk Methodologies listed in the Reference section. Some are easier than others! So look at a few and then decide which one you like. If you want to use another one, just let me know.

If you have any questions, please let me know as soon as possible.

Introduction

a) Introduce your company (Limetree) and state its capabilities.

It’s good business communication practice to double-check assumptions and verbal correspondence. I would copy the background section from final project scenario and make changes as needed.

b) State your goal for the security breach analysis project.

Whatever you write as the goal should be connected to the scope below. Remember, we are in a Risk Assessment and Planning class – so you should include how ‘risk’ fits into the goal(s).

Scope

a) Define the scope of the project.

From a Project Management perspective, the scope is the boundary of the project and specifies what aspects will be included and which aspects are not included. From a cybersecurity perspective, we’re interested in IT systems, facilities, people, cybersecurity procedures and policies; threats and vulnerabilities as mentioned in the Surefire Game or THE BREACH supplemental document.

Here are some ideas:

Answer these questions in essay format:

a) What is the primary reason Limetree is performing this activity?

b) What will the Security Breach Analysis and Recommendations report going to produce? (look back at goals)

c) What were the major threats and vulnerabilities described in the Agent Surefire Game?

d) What were the major threats and vulnerabilities described in THE BREACH supplemental document?

e) Any limitations or constraints?

f) How long will it take? (should be less than a month – you can answer this after you complete ‘Timeline and Benchmarks’ below)

g) About how much will it cost? (you can answer this after you complete ‘Timeline and Benchmarks’ below)

Remember that the title of the Final Project is "Security Breach Analysis and Recommendations" so, keep the discussion to that.

Hardware and Software:

a) Create a list of hardware and software present.

Just list the hardware and software found throughout the Final Project Scenario and the Breach description.

Resources:

a) Determine resources required with brief explanation of why each is required (e.g., internet access, computers, additional personnel).

These are the resources needed to complete the Security Breach Analysis and Recommendations Report (i.e. our Final Project). Here are the main three types of resources (you can add more if you want):

List the Job titles of the team members and what skill-level – team members and their skills, certifications, and experience. How much does each member cost per hour.

List the Hardware & Software – What special hardware or software; any licenses or subscriptions required; like a penetration test suite.

List the Special tools –forensic hard drive duplicators; wireless detection scanners etc.

Hint: A team of 5 would be too large, and a team of 1 is too small.

Timeline and Benchmarks:

a) Discuss your timeline for the project (how long it will take and why).

This can be a bulleted list of the major tasks to be completed (No more than 6 major tasks); under each bullet give a short description. You can list out the tasks and their description like a Project Manager would.

Also, on each bullet, estimate the number of man-hours required to complete each major task. Example: 3 people working 5 days at 40 hours per week is 3 x 40 = 120 man-hours.

EXAMPLE: 1. KICK-OFF Meeting.

The kick-off meeting serves as an opportunity to discuss the organizational structure, introduction of the team to senior leaders and IT staff, reviews the facts of the breach, and defines the scope of the project. Approximately 3 team members, for 2 hours is 6 man-hours.

b) Discuss what regulatory benchmark you will be using to make vulnerability determination.

Here is an example of what this question is looking for:

The regulatory benchmark that will be used in the vulnerability determination is the OCTAVE Allegro methodology (Caralli, Stevens, Young, & Wilson, 2007). The original OCTAVE methodology was developed by the Software Engineering Institute (SEI) at Carnegie Mellon University in 1999. Since then several versions have been developed, and in June 2007, SEI introduced the OCTAVE Allegro methodology.

Any of the risk methods listed in the References (at the end of this document) will be acceptable! Or, if you have a risk method you’d like to use, just let me know.

Approach:

a) State your approach

Here is an example of what this question is looking for:

The OCTAVE Allegro methodology uses an 8-step process for conducting a risk assessment. These are 1) establish risk measurement criteria; 2) Develop an Information Asset Profile; 3) Identify Information Asset Containers 4) Identify Areas of Concern; 5) Identify Threat Scenarios; 6) Identify Risks; 7) Analyze Risks; and 8) Select Mitigation Approach.

OCTAVE Allegro methodology uses questionnaires, worksheets, checklists, and templates to guide the risk assessor through the 8-step process.

b) Define how you will categorize your findings (Example: low, medium, high)

Here is an example of what this question is looking for:

The OCTAVE Allegro methodology uses three categories to evaluate the probability of a threat exploiting a vulnerability – High, Medium, and Low.

The final risk score is determined by a relative risk score, which considers a qualitative risk probability (high, medium, low) combined with a prioritized impact level, taking into consideration the organizations’ criteria.

References

Add your reference here

Have at least 3 or more references. Delete those references that you did not use.

Caralli, R. A., Stevens, J. F., Young, L. R., & Wilson, W. R. (2007). Introducing octave allegro: Improving the information security risk assessment process (No. CMU/SEI-2007-TR-012). Carnegie-Mellon Univ Pittsburgh Software Engineering Institute. Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA470450

CORAS, (2015). The CORAS Method. Retrieved from http://coras.sourceforge.net/

NIST SP 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf

NIST SP 800-39 (2011). Managing Information Security Risk: Organization, Mission, and Information System View. Retrieved from http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf

Stoneburner, G., Goguen, A. Y., & Feringa, A. (2002). NIST SP 800-30: Risk management guide for information technology systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf

5

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Financial Assignments
Top Academic Tutor
Writing Factory
Quick Finance Master
Peter O.
ECFX Market
Writer Writer Name Offer Chat
Financial Assignments

ONLINE

Financial Assignments

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$18 Chat With Writer
Top Academic Tutor

ONLINE

Top Academic Tutor

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$36 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$31 Chat With Writer
Quick Finance Master

ONLINE

Quick Finance Master

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$27 Chat With Writer
Peter O.

ONLINE

Peter O.

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$29 Chat With Writer
ECFX Market

ONLINE

ECFX Market

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

POL 201 American National Government NO PLAGIARISM PLZ - Der Unterschied zwischen Chat GPT Deutsch und anderen Chat-Bot-Tools - Which staffing framework do you recognize in this case study? Explain its characteristics and the advantages to using this type of framework? - Rachel allen walnut cake - .78 inches to fraction - Keloland weather app for iphone - Alumahan fish in english - A net of a rectangular pyramid - Emotional intelligence building blocks - Checkerboard algorithm memory test - West coast hifi osborne park - The reaction inside a chemical heat pack - Resistivity lab report conclusion - Northern territory beekeepers association - Mcgraw hill backpack marketing simulation how to win - ACC561 Week 5 Cost Behavior Analysis - You can grow your intelligence - Carol wan chui pan - Bus 599 assignment 1 - Higgs and rowland 2000 - Habits of mind powerpoint - Classifying polynomials by degree - Fitbit strategic plan - Michael goldstein and hannah snopes - 5 year overseas trained doctor scheme - What happens if you mix hydrogen and oxygen - Chapter 11 managing weight and eating behaviors vocabulary practice answers - Discussion questions about joseph and his brothers - The stolen white elephant sparknotes - Magic of science essay in english - Tom stewart harvard business review - Exploded view solidworks 2013 - Why are proposals important to many businesses - BBA 2026 Article Review Unit 2 and 3 - Cryptic christmas picture quiz - Human resources - What is oral presentation wikipedia - Grade 9 math worksheets - Tigerairways ph promo 2017 - King lear study guide - 15 page powerpoint slide - Dielectric constant of plywood - Clinical significance - Suppose that purely competitive firms producing cashews discover that p exceeds mc. - Disney supplier code of conduct - Operators in c ppt - Humoral ayurvedic and vitalistic approaches are examples of - Hazardous area inspection checklist - Sex offender registry ny watchdog - Uci software engineering catalogue - The waltz dorothy parker - Discussion Post - Find a friend lyrics elizabeth bedford - Video rental company er diagram - BI question - Exploded data flow diagram - Investment Strategy and Products - Relation between courses taken and work - Athletic apparel industry financial ratios - Coraweb births deaths and marriages - IPM plan - Bp texas city report - Advantages and disadvantages of forensic accounting - Fordinsure co uk drive away cover - How is durable medical equipment dme reimbursed in the hhpps - What is the management research question hierarchy - Iodination of acetone equation - Spotlight retail group abn - What correctly lists the overall steps of a bcp - Southwest airlines in baltimore case study - What is a provider sponsored organization - Do leather gloves leave fingerprints - Modern liberal arts winchester - Green computing project topics list - Valencia atlas help desk - Research Paper - Award winning hospital design - Plant cell worksheet answers - A level geography conflict - Distillation of salt water - Phasor diagram of 3 phase induction motor - Consider the following network representation of a transportation problem - Tholos art history definition - Wheel and axle ima - Color Mixer - Strategic management accounting course outline - Famous people in psychology - Chain dimensioning in engineering drawing - Http www learner org courses envsci interactives carbon - Game management authority act - Robert stephens geek squad net worth - Measurements and calculations worksheet - Lyrics to circle of life - F2 molecular orbital diagram - Cossington street swimming baths - What is an arrangement in which the supplier maintains title to the inventory until it is used? - Stoichiometry and gas laws - Hexaco org personality test - Chemical equation for iron - Sc permit test quizlet