Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Octave allegro risk assessment template

04/12/2021 Client: muhammad11 Deadline: 2 Day

ISE 510 Security Risk Analysis & Plan

Security Breach Analysis and Recommendations

Milestone 2: Test Plan

Due

Submitted on

If late let me know why:

=====================================

Delete these instructions in blue font before submission:

Change file name to MS#2_LAST_FIRST

A few comments up front:

Assume you and your team are hired by Limetree as an IT Security consultant to analyze the breach, determine the vulnerabilities, and make recommendations for an extensive security program to include policies, controls, enforcement of controls, and continuous monitoring, all for the purpose of reducing information system risk to an acceptable level.

You will need to look up ONE of the Risk Methodologies listed in the Reference section. Some are easier than others! So look at a few and then decide which one you like. If you want to use another one, just let me know.

If you have any questions, please let me know as soon as possible.

Introduction

a) Introduce your company (Limetree) and state its capabilities.

It’s good business communication practice to double-check assumptions and verbal correspondence. I would copy the background section from final project scenario and make changes as needed.

b) State your goal for the security breach analysis project.

Whatever you write as the goal should be connected to the scope below. Remember, we are in a Risk Assessment and Planning class – so you should include how ‘risk’ fits into the goal(s).

Scope

a) Define the scope of the project.

From a Project Management perspective, the scope is the boundary of the project and specifies what aspects will be included and which aspects are not included. From a cybersecurity perspective, we’re interested in IT systems, facilities, people, cybersecurity procedures and policies; threats and vulnerabilities as mentioned in the Surefire Game or THE BREACH supplemental document.

Here are some ideas:

Answer these questions in essay format:

a) What is the primary reason Limetree is performing this activity?

b) What will the Security Breach Analysis and Recommendations report going to produce? (look back at goals)

c) What were the major threats and vulnerabilities described in the Agent Surefire Game?

d) What were the major threats and vulnerabilities described in THE BREACH supplemental document?

e) Any limitations or constraints?

f) How long will it take? (should be less than a month – you can answer this after you complete ‘Timeline and Benchmarks’ below)

g) About how much will it cost? (you can answer this after you complete ‘Timeline and Benchmarks’ below)

Remember that the title of the Final Project is "Security Breach Analysis and Recommendations" so, keep the discussion to that.

Hardware and Software:

a) Create a list of hardware and software present.

Just list the hardware and software found throughout the Final Project Scenario and the Breach description.

Resources:

a) Determine resources required with brief explanation of why each is required (e.g., internet access, computers, additional personnel).

These are the resources needed to complete the Security Breach Analysis and Recommendations Report (i.e. our Final Project). Here are the main three types of resources (you can add more if you want):

List the Job titles of the team members and what skill-level – team members and their skills, certifications, and experience. How much does each member cost per hour.

List the Hardware & Software – What special hardware or software; any licenses or subscriptions required; like a penetration test suite.

List the Special tools –forensic hard drive duplicators; wireless detection scanners etc.

Hint: A team of 5 would be too large, and a team of 1 is too small.

Timeline and Benchmarks:

a) Discuss your timeline for the project (how long it will take and why).

This can be a bulleted list of the major tasks to be completed (No more than 6 major tasks); under each bullet give a short description. You can list out the tasks and their description like a Project Manager would.

Also, on each bullet, estimate the number of man-hours required to complete each major task. Example: 3 people working 5 days at 40 hours per week is 3 x 40 = 120 man-hours.

EXAMPLE: 1. KICK-OFF Meeting.

The kick-off meeting serves as an opportunity to discuss the organizational structure, introduction of the team to senior leaders and IT staff, reviews the facts of the breach, and defines the scope of the project. Approximately 3 team members, for 2 hours is 6 man-hours.

b) Discuss what regulatory benchmark you will be using to make vulnerability determination.

Here is an example of what this question is looking for:

The regulatory benchmark that will be used in the vulnerability determination is the OCTAVE Allegro methodology (Caralli, Stevens, Young, & Wilson, 2007). The original OCTAVE methodology was developed by the Software Engineering Institute (SEI) at Carnegie Mellon University in 1999. Since then several versions have been developed, and in June 2007, SEI introduced the OCTAVE Allegro methodology.

Any of the risk methods listed in the References (at the end of this document) will be acceptable! Or, if you have a risk method you’d like to use, just let me know.

Approach:

a) State your approach

Here is an example of what this question is looking for:

The OCTAVE Allegro methodology uses an 8-step process for conducting a risk assessment. These are 1) establish risk measurement criteria; 2) Develop an Information Asset Profile; 3) Identify Information Asset Containers 4) Identify Areas of Concern; 5) Identify Threat Scenarios; 6) Identify Risks; 7) Analyze Risks; and 8) Select Mitigation Approach.

OCTAVE Allegro methodology uses questionnaires, worksheets, checklists, and templates to guide the risk assessor through the 8-step process.

b) Define how you will categorize your findings (Example: low, medium, high)

Here is an example of what this question is looking for:

The OCTAVE Allegro methodology uses three categories to evaluate the probability of a threat exploiting a vulnerability – High, Medium, and Low.

The final risk score is determined by a relative risk score, which considers a qualitative risk probability (high, medium, low) combined with a prioritized impact level, taking into consideration the organizations’ criteria.

References

Add your reference here

Have at least 3 or more references. Delete those references that you did not use.

Caralli, R. A., Stevens, J. F., Young, L. R., & Wilson, W. R. (2007). Introducing octave allegro: Improving the information security risk assessment process (No. CMU/SEI-2007-TR-012). Carnegie-Mellon Univ Pittsburgh Software Engineering Institute. Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA470450

CORAS, (2015). The CORAS Method. Retrieved from http://coras.sourceforge.net/

NIST SP 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf

NIST SP 800-39 (2011). Managing Information Security Risk: Organization, Mission, and Information System View. Retrieved from http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf

Stoneburner, G., Goguen, A. Y., & Feringa, A. (2002). NIST SP 800-30: Risk management guide for information technology systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf

5

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Financial Assignments
Top Academic Tutor
Writing Factory
Quick Finance Master
Peter O.
ECFX Market
Writer Writer Name Offer Chat
Financial Assignments

ONLINE

Financial Assignments

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$18 Chat With Writer
Top Academic Tutor

ONLINE

Top Academic Tutor

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$36 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$31 Chat With Writer
Quick Finance Master

ONLINE

Quick Finance Master

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$27 Chat With Writer
Peter O.

ONLINE

Peter O.

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$29 Chat With Writer
ECFX Market

ONLINE

ECFX Market

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Strong campbell interest inventory test - Substantial performance constitutes a minor breach of the contract - How to tell a true war story answers - When did suetonius write the twelve caesars - Phy - The rise of bangladesh's textile trade case study answers - Illuminating Help with Nursing Setting up: A Crucial Procedure for coordinating Headway - Aggps 162 gps receiver - Project copywriting - 5-0-5 agility test times - Bescom org online payment - 5 axioms of communication gamble and gamble - There is a design methodology called rapid prototyping - Convert the azimuths from north to bearings - Research paper - Chapter 8 activity 8.1 test your management iq - Specification for highway works series 600 - What temperature can a blue bunsen burner flame get to - What is kier spates net worth - Nursing - Heavy silk fabric with knobbly surface - Needed in 8 hours - How does teamwork influence innovation at ideo - Vehicle insurance management system project - Destiny 2 niflheim frost - Taking care of books - Honduras tiene un nuevo new programa de - Avaya one x agent stuck on connecting - Wickes acrylic shower panels - Health reform explained video health reform hits main street - Eco 561 week 2 knowledge check - Symmetric to x axis y axis and origin - Small Business Management Discussion - Eating healthy speech outline - Lesson 9 Scientific Notation in the Real World - A paper on case study: Brewing up controversy - Dead poets society notes - Informative Speech Outline and Self Appraisal - Topic Proposal For Final Writing Paper - Essentials of good report writing in business communication - Inductive reasoning and conjecture - Muslim Molvi 7340613399 OnLine No 1 FaMOUs VashIKaraN sPecIaLIsT IN Maheshtala - Cell homeostasis virtual lab answer key - How to manipulate surds - Week 4 Part 2 - 4 stages of prodg - Who were troubadours what was their music like - What is a covalent compound - For a cyclic process the condition is - Convert the following measurement aleks - Dr tan huay cheem - Cambridge law test model answers - What are five recommended steps to make ethical decisions - Algebra quadratic equations - La haine character descriptions - Gender Appropriate And Inappropriate Behaviors - Financial Accounting Data - Rogo trading and appliance service center - Writing Help - SOCW 6090 Week 4 - Post Responses - In the fog by milton geiger - Respond to the discussion board - Read An Introduction to Confucianism and write an 5 pages essay - Assonance in jfk inaugural address - Ken danby public school - Implement stimulus control transfer procedures examples - Continuity between compressor windings - Cloud Computing - Week 10 - Similarities between taming of the shrew and 10 things - Uni sa study periods - Alphabet shift code breaker - Interpersonal process recording nursing - Novel Exploratory Essay Topics - The tires of a car make revolutions - Axe target market demographics - Lesson 4.7 flowchart thinking answers - Characteristics of input output devices - Qnt 351 week 2 individual assignment - Stellaris how to change governing ethics - Describe the abercrombie & fitch style - Acc 202 final project part ii - Project - Difference between dfs and dft - What does the word root hyster refer to - Debido al estrés, mario (comenzar) a consumir alcohol en exceso. - Asian cultural traditions heinz pdf - Importance of dichotomous key - The stranger book club questions - Temperate forest biome climate graph - Through _____, marketers ascertain the need for new goods and services. - Palen creek correctional centre phone number - Jimmy possum leather sofa - Grow fast or die slow - Metaphors in the scarlet ibis - Case study on budgeting - Travis perkins warrington postcode - Dr - Austin brown unchained melody - Jazz styles history and analysis 9th edition