Risk factors and Situation Analysis
Discuss about the Risk Evaluation Of Fitters Snackers Company.
The major risks that are incurred in the processing of the Internet Security Protocol for the usage of the Internet Security Protocol using the WAN are as follows: –
- The biggest risk that is present in the WAN service includes the threat that takes into consideration the fact that the ignorance of the management of the parts that are related to the Information technology. This is stated as the data breaches that occur in the processing of the Internet Security Protocol are due to the lack of the focusing of the data management. The major problem is in the processing as it over sights the processor and the assumption is made in the processing of the data management. The major issues are related to the organization, which is suffering through the current thread environment. This fact ensures that the organization becomes the easy target for the hackers.
- The protection from malware is very less secured in this networking system. The networking system does not provide robust security from the approach made by the malware system, this is because of the absent minded click by the users and the, malicious pages are enough to affect the WAN protocol.
- The network engineer are in charge of the application security, which leads to the fact that the engineers over look the applications that are not very important in the processing of the networking. This acts as the loop hole in the WAN protocol, which leaves a gap for the hackers to gain access to the portals.
- Due to the fact that the number of users of the WAN protocol are increasing the robustness of the protocol decreases as the data base of the WAN are not very robust in nature and the loop holes gets more popularized, leading to the fact that the redundancies of the protocol gets exposed. The exposed redundancies are then used against the protocol by the hackers. The fact that the loop holes gets speeded among the entire mass the hackers take undue advantage o the system. this exploitation of the loop hole helps in the processing of the unauthenticated access to the data that do not have permission for access by the extruder.
- With the decrease in the robustness in the WAN protocol the data that are stored in the data base of the system might get modulated and get corrupted due to the fact that the processing of the data is done in an un authenticated manner. This modulation of the data that are stored in the data base includes the fact that the organizations that has stored data in the organization looses the data hat are stored in it. The modulation of the data by the hackers also conclude the fact that the data processing brings a negative node in the progress of the organization.
- The masking of the protocol will ensure the fact that the data projection will not support the masking feature in the WAN protocol.
Risk |
Probability (P) |
Impact (I) |
Rating= P*I |
Risk mitigation |
Over sighting the processor |
7 |
2 |
14 |
For mitigating the process of the risk management regarding the over sighting of the unnecessary applications, the networking engineers who are appointed in the process of networking services are termed as the processing of the engineers must be very sincere in nature and the functioning of the engineers. This fact will take into consideration the fact that the over sighting of the application will be terminated. Leading to the fact that the risk is mitigated from the WAN protocol |
Malware attack |
4 |
7 |
28 |
The malware attack can be reduced only with the help of Rkill. The usages of the Malwarebytes are also used to mitigate the Malware attack. After processing the Malwarebytes, Hitman scan is applied to the process after the implementation of the Malwarebytes. Emisoft kit tests the software application leading to the fact that the malware functions are terminated. |
Exposed redundancies |
6 |
7 |
42 |
To mitigate the exposed redundancies that are present in the WAN protocol can be terminated with the proposing of the imposing passwords. While setting the password, it must be kept in mind that the default password that is set initially is changed. Many security stages must be set before allowing the access of the extruders who intend on gaining unauthenticated access to the data base |
Modulation of data |
3 |
8 |
24 |
The modulation of the data can be terminated by the processing that the data that are stored in the data base with the help of the WAN protocol cannot be accessed by the imposters. Installing firewall ensures the fact that the data transcription is not allowed from the processing of the data management. The modulation of the data can be prevented by setting a reference framework, which will ensure the fact that the technology that is used in the processing of the data setting will be more robust in nature. This will ensure the fact that the access to the data that are stored in the data base of the organization with the help of the WAN protocol stays safe. Another way of protecting the data from corruption is that the back up of the data must be kept, which leads to the fact that the data are kept safe |
The major objective of the plan is to set the fact that processing of the projection of networking efficiency is maintained and the hardware systems support the processing of the data management and the robustness of the servers and the switches are maintained despite the fact that the number of employees of the organization will increases in a fast rate.
Situation Analysis (Background and reasoning)
The main objective of the Fitter’s Snackers Company is expand in a very high rate, as the terminologies suggest the fact that the company will expand to a huge amount as much as 100%. This seeks the fact that the count of the employees will increase from 500 to nearly 1000 in the next 3 years.
The major risk factors that are present in the processing of the project will be the ignorance of the management of the parts that are related to the Information technology. The protection from malware is very less secured in this networking system. Due to the fact that the numbers of users of the WAN protocol are increasing the robustness of the protocol decreases. With the decrease in the robustness in the WAN protocol the data that are stored in the data base of the system might get modulated and get corrupted.
The risk management of the project ensures the fact that the risks that might be heading to the organization will be known previously and the actions can be taken hence wise previously to prevent the problems
To mitigate the problem regarding the issue of the over sighting of the processor, the processing of the engineers must be very sincere in nature and that is the only way that will ensure that the over sighting is avoided. The malware attack can be reduced only with the help of Rkill. Malwarebytes also helps in the processing of the data management and keep the system free from the processing of the malware. To mitigate the exposed redundancies that are present in the WAN protocol, password must be set initially, in order to stop the imposters to gain access to the data that are stored in the database of Fitters Snackers Company.
In case the risk management plan regarding the processing of the risk management fail for the procurement of the data analytics, the other ways will be the processing of the server with the help of a third party processor which will keep on storing the data once the updating is performed in the primary processor. This will ensure the fact that even if the server gets corrupted and the dial on internet does not work properly, the backup of the entire data will be present.
The resources that will be required are as follows: –
WLAN setup, High efficiency servers, Fast Internet to support the working of 1000 employees
The monitoring and the control steps that must be taken in order to deal the fact that the terminology regarding the processing of the data will ensure the fact that functioning of the project management will be much more efficient in nature, leading to the fact that the newly hired employees.
References
Dwyer, A., The NHS cyber-attack: A look at the complex environmental conditions of WannaCry. (RAD Magazine, 44, pp.25-26, 2018).
Holm, L. Cyber attacks & coercion in the digital era.: (A qualitative case analysis of the North Korean cyber attack on Sony Pictures, 2017).
Johnson, T.A. ed.,. Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare and Project Management (CRC Press ,2015).
Kenney, M.,. Cyber-terrorism in a post-stuxnet world. Orbis, (59(1), pp.111-128, 2015).