Main Menu

My Account
Online Free Samples
   Free sample   Information systems security assignment risk management report for the sprout foundation

Information Systems Security Assignment: Risk Management Report For The Sprout Foundation

Question

Task: Prepare a detailed risk management report in the information systems security assignment identifying the existing risks and assessment factors in The Sprout Foundation (TSF)

Answer

1. Introduction
The current report on information systems security assignment is based on security management and risk identification at the information system 'The Sprout Foundation.' The IT system manager of TSF and the board of directors are willing to adopt a risk assessment audit for understanding their most vulnerable and risk related areas and generate a security management report from an external 'Information System Security' auditor. The threats related to the information security risks related to its stakeholders and their association with the vulnerabilities, such as technical insufficiencies, 'unauthorized' activities in an organization's information system, lack of 'essential' services, and other physical consequences. In the current scenario, information security is one of the most crucial aspects of any organization in transferring and acquiring important data over a network without interfering with an external source. It leads the various organization to apply and adopt 'information security risk management' (ISRM) in developing economic and efficient control viabilities (Shamala et al., 2017). The current report will analyze the value and potential risk to the information system at TSF, and its associated people.

2. Assessment of TSF’s Value
2.1 Activity and Strategic Context Creation

In the current business management process, the organizations are heavily dependable on the technologies and 'information systems' to conduct works efficiently. The IT system manager at TSFs is inclined towards understanding the existing risk at their organization with the help of an external auditor. The reason behind this decision by the IT manager and the board of directors at TSF is to conduct the risk assessment process in an unbiased way. The ‘human resource information systems’ (HRIS) is known to be one of the crucial assets in the ‘information security system’ in an organization that is related to the organization’s valuable assets related to the ‘human resource’ (Buzkan, 2016). Any internal asset, such as information related to customers and employees, financial reports, transactions and other property-related documents that can be a threat to be in the hand of an external source are the valuable asset in terms of activity and strategic context of the organization.

2.2 Target Risk ‘Appetite’ and Risk Tolerance Level
The risk 'appetite' at TSF organization is related to their operational process related to their cloud computing, information security risk policies, 'BOYD' policy, malware threat, and lack in detecting and disseminating knowledge on cybersecurity. The time and economic conditions are also in the question of calculating risks and predicting 'corporate' bonds on assessing the return (Bekaert, Engstrom and Xu, 2019). TSF is capable of tackling their potential and existing risks with the help of appropriate information security policies and proper knowledge-based training to the employees. The risk tolerance will be measuring any cyberattack in both economic and non-economic effects to analyze their mitigation process and strengthen the IT management to be aware of any uncertain situation.

3. Key Roles and Responsibilities of Individuals in the Department
The stakeholders and board of directors of TSF are responsible for the risk assessment process and new change adoption in the management.

Stakeholders/Individuals

Priority

Responsibility

CTO (‘Chief Technical Officer’)

High

The CTO of TSF will analyze the current existing risks from the risk assessment report and consult with the IT manager and financial head of the organization in calculating the future changes and investment process

CFO (‘Chief Financial Officer’)

High

The CFO has already agreed to propose a budget conducting with the risk and security management department of TSF to improve its current situation. CFO is also responsible for observing the whole analysis and resolving process to continue the 'cash-flow' for sustainability.

Manager (IT Systems)

High

The IT systems manager is responsible for working with the external ‘information systems security’ auditor to approve the risk assessment report and start working on resolving the problematic areas. The manager is also responsible for directing the employees in the right direction.    

Risk and Security Management Employees

Medium

They will help the external auditor with the internal security processes and help in identifying the potential risks

IT Employees

Medium

They will cover the directions achieved from the IT systems manager in improving the information security system at TSF

‘Information Systems Security’ Auditor (External)

High

The main responsible person for the current risk assessment report consulting with the IT systems manager and other employees. The auditor is responsible for identifying the internal risks and present a management report on risk and security at the information systems.

4. Audit and Analysis Case Evidence
4.1 Inventory Assessment

One of the most crucial principles at the 'information assurance' field identified in this information systems security assignment is ‘information asset inventory.’ It helps in accounting organization’s data during the business process infrastructure. Maintenance of an ‘inventory asset’ list related to the information systems is important in managing the risk areas effectively. The inventory assets under the TSF are their employee and customer details, business data, financial information, and transaction report, business files that are saved at the cloud storage, etcetera. This inventory asset at the information system of TSF is related to the ‘physical,’ ‘information,’ ‘staff,’ and ‘service’ assets.

4.2 Information Asset Identification
The identification of the assets related to the information system at TSF is comprised of the security system at the information, internal network, computer system, cloud computing system, and other data-driven devices. Anything that manages information with a technology-led data is considered as an asset at the information system. It is stated herein information systems security assignment that the 'information security risk assessment' (ISRA) in an organization like TSF is responsible for identifying the assets related to information systems systematically and comprehensively (Shedden et al., 2016). The assets are considered to those devices and data that are important for processing the organization's business activities and are valuable in both economic and non-economic ways.

4.3 What are the TSF’s Significant, Physical and Logical Information Resourcesmentioned in this information systems security assignment?

Asset Field

Significant Resources

Description

Physical

Internal servers, hardware devices, RTU device, PLC device, processors

The physical assets are mainly the hardware systems that help in managing the information systems in the TSF organization.

Logical

Operating systems, cloud storage

It is the operating system and cloud storage system that helps in managing the data and documents digitally with the help of physical resources.

Information

Database, ‘SCADA’ software, ‘firmware’

The information resources are mainly the database system and 'SCADA,' which is a control system architecture that managers data from computer, network, and 'graphical user interfaces' (GUI).

Service

Gateways, firewalls, anti-malware software

The service resources will help in reducing the malware attack, and cyberattacks by creating a strong anti-virus ‘firewall’

5. Risk Identification
5.1 Analysis of Existing Threats and Vulnerabilities that Provide Risks to the TSF

The threats at the information security system can be related to malware attacks, 'software' attacks, intellectual theft, data breaching, and external interference in the cloud storage and data documentation system. Different tools and technologies used by organizations to provide 'safeguard' including the risks assessment methodology (Figueira, Bravo and López, 2020). The vulnerability at the information systems risks can be related to the 'destruction' and error at the system. The existing threats at the information system at TSF as noted in the information systems security assignmentcan be related to the inefficient 'cybersecurity' policies, lack in detecting the cyberattacks, lack of proper cybersecurity knowledge, cloud storage, and 'BOYD' policy. These risks can affect the company for a long duration if not taken any management decisions.

5.2 TSF’s Most Important Information Asset that can Face High Risks
The risks from the information systems and management can make a significant impact on the organization’s mission and goals (Figueira, Bravo and López, 2020). The most important asset related to the information systems at TSF can be the data related to the employees and customers, financial reports, transaction documents, cloud storage systems, external network systems, and malware attacks. These risks can lead the organization to face various problems from financial and non-financial related factors.

6. Likelihood and Impact Analysis on Six Distinct Risks at TSF
The significant risks under the TSF organization that has been identified as the 'information system security' auditor can be,

Risks

Likelihood

Impact

Description

Lack in Detecting Cyberattack

High

High

After analyzing the current internal activities at the TSF, it has been pointed out there is a lack of understanding of the on-going cyberattack at the organization. The lack of knowledge and information among the current IT specialist makes the whole process difficult in detecting the cyberattack when it occurs. The 'static' approach at the organization's traditional security detection process mentioned in this segment of information systems security assignment is inefficient and cannot detect the new age complex and resilient cyber threats (Tounsi and Rais, 2018).

Insufficient ‘cybersecurity’ policy

Medium

Medium

Another crucial factor can be noticed at the TSF in their policy regulations, where the 'cybersecurity' policy has been considered as not according to the standard. The increasing security breaches with the 'advanced' technologies make it difficult for the organizations to complain against these new age attacks with appropriate laws. The appropriate understanding of the information security policy in an organization can help them in reducing risks from the employees and external sources (Safa, Von Solms and Furnell, 2016).   Organizations are spending millions of dollars each year to deal with cyberattack cases, and some of them face more problems due to inappropriate policy.

‘BYOD’ (‘bring your own device’) policy

High

Medium

TSF generates a more flexible working environment for its employees by allowing them to bring their devices at the workplace. However, it has been in a great concern recently, that the 'BYOD' policy can generate huge threat by conducting malicious works with the organization's network. This particular policy mentioned in the present context of information systems security assignment comes with both employee productivity and security risks in conducting business activities (Alotaibi and Almagwashi, 2018). 

Internal Cloud storage accessed by public network

Medium

Medium

Cloud computing is an integral part of the TSF in managing their valuable data and information securely to sustain its operation process. However, cloud storage management can be conducted over the network system, which makes the system exposed to external networks. As the cloud storage application runs without accessing the 'on-premise' architecture, it works on the encryption system (Odun-Ayo et al., 2017). Sometimes cyber-criminals break the encryption from a public network to breach the information.

Inefficient ‘information security’ training

High

Medium

TSF is currently facing difficulties in engaging their employees with proper training on the information security system. Almost half of the companies out there are emphasizing on providing security training to their old and new employees. It has been identified that training on the information does not only expands the knowledge of security information but also makes a significant impact on shaping their behavior towards security awareness (Stefaniuk, 2020).

Threat from malware

Low

High

Malware threat is not a new thing in the world of the information security system. There is various harmful malware such as Trojan, spyware, and other viruses that generate destruction to the computer through any software. However, TSF has a strong team in their information security process with effective algorithms in detecting malware with a 'bag-of-words' (BOW) approach (Halim, Abdullah and Ariffin, 2019).

7. Evaluate and Prioritize Six Significant Risks at TSF to Manage
After identifying the potential risks at TSF organization in the above section of information systems security assignment related to its internal network and storage system along with other policies, the evaluation and prioritization of those six risks can be,

Risks

Evaluation

Prioritizing

 

 

Impact when the Risk Occurs

Probability of Risks being Occurring

 

 

H

M

L

H

M

L

Lack in Detecting Cyberattack

The IT professionals at the TSF organization are still comfortable in practicing the traditional cyberattack detection process. However, the new age virus and cybercrimes are advanced and cannot be detected by the traditional process. The organization can adopt a 'cumulative' algorithm in detecting the cyberattack fast from both distributed and centralized detection settings (Kurt, Y?lmaz and Wang, 2018). The contemporary detection process at the TSF can be evaluated by engaging proper information security knowledge and training programs among the IT employees.

 

 

 

 

 

 

Insufficient ‘cybersecurity’ policy

Every company including TSF has its regulation policies for its working environment to the information security service. TSF can develop policies related to their cybersecurity process, and establishment of cybersecurity governance among the operational factors. However, the inappropriate policy can restrict the organizations to deal with the cybersecurity from both internal and external sources. It is a global 'phenomenon' and the awareness and visibility among the public on various impacts from the cyberattack are still questionable (de Bruijn and Janssen, 2017). It is derived from the inability in detecting the failing policies in detecting and identifying cyberattacks with the help of appropriate policies (de Bruijn and Janssen, 2017). 

 

 

 

 

 

 

‘BYOD’ (‘bring your own device’) policy

TSF can increase their 'BYOD' policy with a protection security password and enhance their security budget for identifying loopholes in using their device in generating cybersecurity threats. The lack of a proper policy system and 'safeguards' makes the 'BYOD' policy to make a negative impact on security risks (Dhingra, 2016). Under the ‘BYOD’ policy makes it secure for the employees.

 

 

 

 

 

 

Internal Cloud storage accessed by public network

In the current scenario, cloud computing has become an integral 'paradigm' in providing high-quality services to the customers and makes the work of IT professionals efficient. However, it is mainly associated with various risks, such as loss of data, information breaching, and inefficient policies (Al-Ruithe et al., 2018).

 

 

 

 

 

 

Inefficient ‘information security’ training

TSF can add the training program on the information security system to both new and old employees. In various organizations, the management has pointed out that the information security system is one of the weak links in the operation process, also it an important asset in decreasing risks related to the 'data' security (Shouran, PRIYAMBODO and Ashari, 2019).

 

 

 

 

 

 

Threat from malware

The threat from malware can be generated from both internal and external sources in the TSF. The increasing 'cyberattacks' makes cyber risks aggressive and vulnerable. No matter how the technologies become advanced in the current situation, cyber-criminals have evolved their tactics in spreading malware from their extended family of 'ransomware' (Vermeulen, 2018). A strong anti-virus system at the internal system can resolve the threat.

 

 

 

 

 

 

8. Conclusion
From the above analysis on information systems security assignment, it can be stated that the information systems security and management in an organization is the most crucial aspect in the current scenario. The risks related to the TSF organization from the cyberattack, lack of appropriate cybersecurity policies, and malware attacks can make the business processes vulnerable and imply a threat to the organization. The current risk assessment reportwill help in the management and board of directors of TSF in identifying their weak spots for increasing the cyberattacks and provide details in mitigating the risks to sustain their operational processes.

9. Bibliography
Al-Ruithe, M. et al. (2018) ‘Addressing Data Governance in Cloud Storage: Survey, Techniques and Trends’, information systems security assignmentJournal of Internet Technology, 19(6), pp. 1763–1775.

Alotaibi, B. and Almagwashi, H. (2018) ‘A Review of BYOD security challenges, solutions and policy best practices’, in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). IEEE, pp. 1–6.

Bekaert, G., Engstrom, E. C. and Xu, N. R. (2019) The time variation in risk appetite and uncertainty. National Bureau of Economic Research.

de Bruijn, H. and Janssen, M. (2017) ‘Building cybersecurity awareness: The need for evidence-based framing strategies’, Government Information Quarterly, 34(1), pp. 1–7.

Buzkan, H. (2016) ‘The role of human resource information system (HRIS) in organizations: a review of literature’, Academic Journal of Interdisciplinary Studies, 5(1), p. 133.

Dhingra, M. (2016) ‘Legal issues in secure implementation of bring your own device (BYOD)’, Procedia Computer Science, 78(C), pp. 179–184.

Figueira, P. T., Bravo, C. L. and López, J. L. R. (2020) ‘Improving information security risk analysis by including threat-occurrence predictive models’, Computers & Security, 88, p. 101609.

Halim, M. A., Abdullah, A. and Ariffin, K. A. Z. (2019) ‘Recurrent Neural Network for Malware Detection’, Int. J. Advance Soft Compu. Appl, 11(1).

Kurt, M. N., Ylmaz, Y. and Wang, X. (2018) ‘Distributed quickest detection of cyber-attacks in smart grid’, IEEE Transactions on Information Forensics and Security, 13(8), pp. 2015–2030.

Odun-Ayo, I. et al. (2017) ‘An overview of data storage in cloud computing’, in 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS). IEEE, pp. 29–34.

Safa, N. S., Von Solms, R. and Furnell, S. (2016) ‘Information security policy compliance model in organizations’, computers & security, 56, pp. 70–82.

Shamala, P. et al. (2017) ‘Integrating information quality dimensions into information security risk management (ISRM)’, Journal of Information Security and Applications, 36, pp. 1–10.

Shedden, P. et al. (2016) ‘Asset identification in information security risk assessment: A business practice approach’, Communications of the Association for Information Systems, 39(1), p. 15.

Shouran, Z., PRIYAMBODO, T. K. and Ashari, A. (2019) ‘Information System Security: Human Aspects’, International journal of scientific & technology research, 8(03), pp. 111–115.

Stefaniuk, T. (2020) ‘Training in shaping employee information security awareness’, Entrepreneurship and Sustainability Issues, 7(3), pp. 1832–1846.

Tounsi, W. and Rais, H. (2018) ‘A survey on technical threat intelligence in the age of sophisticated cyber attacks’, information systems security assignmentComputers & security, 72, pp. 212–233.

Vermeulen, J. (2018) ‘An analysis of fusing advanced malware email protection logs, malware intelligence and active directory attributes as an instrument for threat intelligence’.

NEXT SAMPLE

Related Samples

Question Bank

Looking for Your Assignment?

Search Assignment
Plagiarism free Assignment

FREE PARAPHRASING TOOL

PARAPHRASING TOOL
FREE PLAGIARISM CHECKER

FREE PLAGIARISM CHECKER

PLAGIARISM CHECKER
FREE PLAGIARISM CHECKER

FREE ESSAY TYPER TOOL

ESSAY TYPER
FREE WORD COUNT AND PAGE CALCULATOR

FREE WORD COUNT AND PAGE CALCULATOR

WORD PAGE COUNTER



AU ADDRESS
9/1 Pacific Highway, North Sydney, NSW, 2060
US ADDRESS
1 Vista Montana, San Jose, CA, 95134
ESCALATION EMAIL
support@totalassignment
help.com