Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Octave allegro risk assessment template

04/12/2021 Client: muhammad11 Deadline: 2 Day

ISE 510 Security Risk Analysis & Plan

Security Breach Analysis and Recommendations

Milestone 2: Test Plan

Due

Submitted on

If late let me know why:

=====================================

Delete these instructions in blue font before submission:

Change file name to MS#2_LAST_FIRST

A few comments up front:

Assume you and your team are hired by Limetree as an IT Security consultant to analyze the breach, determine the vulnerabilities, and make recommendations for an extensive security program to include policies, controls, enforcement of controls, and continuous monitoring, all for the purpose of reducing information system risk to an acceptable level.

You will need to look up ONE of the Risk Methodologies listed in the Reference section. Some are easier than others! So look at a few and then decide which one you like. If you want to use another one, just let me know.

If you have any questions, please let me know as soon as possible.

Introduction

a) Introduce your company (Limetree) and state its capabilities.

It’s good business communication practice to double-check assumptions and verbal correspondence. I would copy the background section from final project scenario and make changes as needed.

b) State your goal for the security breach analysis project.

Whatever you write as the goal should be connected to the scope below. Remember, we are in a Risk Assessment and Planning class – so you should include how ‘risk’ fits into the goal(s).

Scope

a) Define the scope of the project.

From a Project Management perspective, the scope is the boundary of the project and specifies what aspects will be included and which aspects are not included. From a cybersecurity perspective, we’re interested in IT systems, facilities, people, cybersecurity procedures and policies; threats and vulnerabilities as mentioned in the Surefire Game or THE BREACH supplemental document.

Here are some ideas:

Answer these questions in essay format:

a) What is the primary reason Limetree is performing this activity?

b) What will the Security Breach Analysis and Recommendations report going to produce? (look back at goals)

c) What were the major threats and vulnerabilities described in the Agent Surefire Game?

d) What were the major threats and vulnerabilities described in THE BREACH supplemental document?

e) Any limitations or constraints?

f) How long will it take? (should be less than a month – you can answer this after you complete ‘Timeline and Benchmarks’ below)

g) About how much will it cost? (you can answer this after you complete ‘Timeline and Benchmarks’ below)

Remember that the title of the Final Project is "Security Breach Analysis and Recommendations" so, keep the discussion to that.

Hardware and Software:

a) Create a list of hardware and software present.

Just list the hardware and software found throughout the Final Project Scenario and the Breach description.

Resources:

a) Determine resources required with brief explanation of why each is required (e.g., internet access, computers, additional personnel).

These are the resources needed to complete the Security Breach Analysis and Recommendations Report (i.e. our Final Project). Here are the main three types of resources (you can add more if you want):

List the Job titles of the team members and what skill-level – team members and their skills, certifications, and experience. How much does each member cost per hour.

List the Hardware & Software – What special hardware or software; any licenses or subscriptions required; like a penetration test suite.

List the Special tools –forensic hard drive duplicators; wireless detection scanners etc.

Hint: A team of 5 would be too large, and a team of 1 is too small.

Timeline and Benchmarks:

a) Discuss your timeline for the project (how long it will take and why).

This can be a bulleted list of the major tasks to be completed (No more than 6 major tasks); under each bullet give a short description. You can list out the tasks and their description like a Project Manager would.

Also, on each bullet, estimate the number of man-hours required to complete each major task. Example: 3 people working 5 days at 40 hours per week is 3 x 40 = 120 man-hours.

EXAMPLE: 1. KICK-OFF Meeting.

The kick-off meeting serves as an opportunity to discuss the organizational structure, introduction of the team to senior leaders and IT staff, reviews the facts of the breach, and defines the scope of the project. Approximately 3 team members, for 2 hours is 6 man-hours.

b) Discuss what regulatory benchmark you will be using to make vulnerability determination.

Here is an example of what this question is looking for:

The regulatory benchmark that will be used in the vulnerability determination is the OCTAVE Allegro methodology (Caralli, Stevens, Young, & Wilson, 2007). The original OCTAVE methodology was developed by the Software Engineering Institute (SEI) at Carnegie Mellon University in 1999. Since then several versions have been developed, and in June 2007, SEI introduced the OCTAVE Allegro methodology.

Any of the risk methods listed in the References (at the end of this document) will be acceptable! Or, if you have a risk method you’d like to use, just let me know.

Approach:

a) State your approach

Here is an example of what this question is looking for:

The OCTAVE Allegro methodology uses an 8-step process for conducting a risk assessment. These are 1) establish risk measurement criteria; 2) Develop an Information Asset Profile; 3) Identify Information Asset Containers 4) Identify Areas of Concern; 5) Identify Threat Scenarios; 6) Identify Risks; 7) Analyze Risks; and 8) Select Mitigation Approach.

OCTAVE Allegro methodology uses questionnaires, worksheets, checklists, and templates to guide the risk assessor through the 8-step process.

b) Define how you will categorize your findings (Example: low, medium, high)

Here is an example of what this question is looking for:

The OCTAVE Allegro methodology uses three categories to evaluate the probability of a threat exploiting a vulnerability – High, Medium, and Low.

The final risk score is determined by a relative risk score, which considers a qualitative risk probability (high, medium, low) combined with a prioritized impact level, taking into consideration the organizations’ criteria.

References

Add your reference here

Have at least 3 or more references. Delete those references that you did not use.

Caralli, R. A., Stevens, J. F., Young, L. R., & Wilson, W. R. (2007). Introducing octave allegro: Improving the information security risk assessment process (No. CMU/SEI-2007-TR-012). Carnegie-Mellon Univ Pittsburgh Software Engineering Institute. Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA470450

CORAS, (2015). The CORAS Method. Retrieved from http://coras.sourceforge.net/

NIST SP 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf

NIST SP 800-39 (2011). Managing Information Security Risk: Organization, Mission, and Information System View. Retrieved from http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf

Stoneburner, G., Goguen, A. Y., & Feringa, A. (2002). NIST SP 800-30: Risk management guide for information technology systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf

5

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Financial Assignments
Top Academic Tutor
Writing Factory
Quick Finance Master
Peter O.
ECFX Market
Writer Writer Name Offer Chat
Financial Assignments

ONLINE

Financial Assignments

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$18 Chat With Writer
Top Academic Tutor

ONLINE

Top Academic Tutor

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$36 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$31 Chat With Writer
Quick Finance Master

ONLINE

Quick Finance Master

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$27 Chat With Writer
Peter O.

ONLINE

Peter O.

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$29 Chat With Writer
ECFX Market

ONLINE

ECFX Market

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Week 3 - Journal: Identifying an Organizational Problem - NURSING PAPERS - Information Systems Research in the Digital World. - Herasay - Discussion - Research Paper - What are the importance of family resources - Introduction to Social Problem - In the zzzz best case, barry minkow was charged with: - Vincent brody guided reflection answers - Caterpillar company structure - Ws 5.4 ideal gas law answers - Splendid blender pen hobby lobby - How to make a website using notepad with pictures - DISCUSSION #3 - Tennis steps to success - Bloomberg exchange rates usd to gel - Bachelor of biomedical science uts atar - 21 praises to tara - Gainesboro machine tools corporation - Iodination of acetone prelab - African child chapter by chapter summary - Batch reactor example problems - Clapham manor swimming pool - Descartes third meditation summary - 4 - dictado listen as each sentence is read twice and write what you hear. - Badminton skills and techniques - Week 4 Discussion Organizational Behavior - REFLECTING ON READING #2 - Journal 2 - Rensing groomers is in the dog grooming business - Derivative of e y - Mass effect 3 annos basin scan locations - Unlink reservation my disney experience - Bailey and burch ethics scenarios - Student smart card application project - Stalag 8b prisoner list - Research Paper on Fingerprint Analysis (AFIS and IAFIS database) - 2 year old observation example - Positive and negative characteristics of a criminal investigator - Which css property configures the font typeface - Wrigley financial statements - Bim 360 model coordination workflow - Statistics Assignment (Need in 18 hours) - Do crocodiles have opposable thumbs - Environmental Discussion Question (Mod 4) - Comunity Nurse DQ 8 - Grand chase rufus 4th job - Shear force and bending moment diagram for frames - What percent of the waste from frito-lay's orlando plant goes to the landfill? - Diversity swot analysis example - Small dense star crossword - The casino industry case analysis - What does montag's description of the tv audience mean - Scales used in quantitative research - Police investigation report sample format - Why is uluru on the world heritage list - Udavum karangal anna nagar - Module 3 lecture questions - Powerpoint required - What is the mood in the cask of amontillado - The burning of 80.3 g of sih4 - 03.06 writing narrative body paragraphs - What is the cardinal rule for public relations practitioners - Fin 571 financial ratio analysis - John matthus watson iii - The loaded dog analysis - Hypothesis for projectile motion - ISSP Policy - Further exam 1 2019 - The microscope slide rests on the __________ while being viewed - Revising and presenting your writing - Examples of project plan - Review of results unsw - Microscope parts and functions - Assignment: Needs Assessment Surveys - Kelvin hall school website - History of Labor Relations - How to write an analytical report examples - James and the giant peach chapter 10 - Business Intelligence - Verse using short long crossword - ME - Main - Week 5 - Homework 1 & 2 - Cadley hill industrial estate - Asme pressure vessel definition - To kill a mockingbird tree filled with cement - Identify an organizational pattern for an informative speech - Event Planning - An electron with an initial velocity - Bird beak adaptations worksheet - Www stickyball net phonics html - The social work skills workbook cournoyer pdf - What is force summation - Experiment 5 physical skeleton the axial skeleton - Naughty and nice rutherford trading hours - Modi podi underwear - How was the triple entente formed - Rspo palm oil fact sheet - Todd lamb weight loss tea recipe