In UK, a cloud service provider named CloudXYZ, provides IT network/ system for various organizations. CloudXYZ ensures securing storage and virtual server services for both the individual customers and for the organizations. Ultimately, they target on security system for preventing or decreasing any business loss due to incidents like data modification, malfunction, data deletion and information stealing. The task of this project includes to perform risk assessment for the provided security network architecture. For performing risk assessment, there exists certain “open-source” methods and some proprietary methods, which provides answer to the questions like- What must be protected? What are the vulnerabilities and threats? What are its implications? What value it has to the organization? and What could decrease the damages? Therefore, these are the advantages of risk assessment methods. The utilized risk assessment methods are, Qualitative Risk Assessment Matrix (RAM), Risk Probability and Impact Assessment, Combination of checklists and what-if analysis methods, and Preliminary environment risk ranking method. The ISO 27001 based Risk Assessment Tool is effective solution. The impact analysis and likelihood are the other tasks which will be performed during the risk assessment on the given system. Because, it helps to determine the potential impacts resulting from the critical business processes. Moreover, the risk assessment methods help to provide suggestions of whether the system’s security, integrity, confidentiality must be increased or not?
For maintaining the database, security tool, website and other services which provides a function for security vulnerability or exposure identification is known as capability. Here, the user denotes the owner and the owner has the responsibility of maintaining the capability. The CVE (Common Vulnerabilities and Exposures) compatibility provides the facility of sharing the data, only when there is accurate capability mapping. Thus, it is required that CVE-compatible capabilities should meet minimum accuracy requirements (Cve.mitre.org, 2018).
The owner specifications include the following (Cve.mitre.org, 2018):
The assets are considered as either primary or secondary, to recognize the assets that are imported. For instance, the assets that should be imported first when compared to the other assets are referred as primary assets and the assets which will be imported after the primary assets are referred as the secondary assets (Support.symantec.com, 2011).
The primary assets contains super-set of the secondary assets. For instance, when a Control Compliance Suite is considered, it is required to first import the Windows Domain prior to importing the Windows Machines. Thus, here the primary asset is denoted as Windows Domain and the secondary asset is denoted as Windows Machine. On the other hand, in the asset system, the Windows Domain is called as the default scope for the Windows Machines. On the other hand, default scope refers to importing the primary assets prior to the secondary assets.
ID |
Asset |
Primary or Secondary Asset |
CS |
Cloud storage |
Primary Asset |
VS |
Virtual server |
Secondary Asset |
AS |
Authentication Server |
Secondary Asset |
CD |
Customer Database |
Secondary Asset |
WS |
Web server |
Secondary Asset |
MS |
Mail Server |
Secondary Asset |
FW |
Firewall/IDS |
Secondary Asset |
I |
Internet |
Primary Asset |
The CloudXYZ organization’s assets their threats and vulnerabilities are as follows:
Threats
The security breaches comprises of healthcare data, revenue details and financial data (Networkmagazineindia.com, 2002).
There are possibilities of heavy loss of data and it could be highly expensive for the organization.
The threats of IT and network security could harm the organizational infrastructure.
Vulnerabilities
Threats
Threats
Vulnerabilities
Threats
Vulnerabilities
Threats
Vulnerabilities
Threats
Vulnerabilities
Threats
Vulnerabilities
Threats
This is a serious threat, where unauthorized user can easily access other person’s confidential information, for performing malicious activities and harming them.
The computer programs are sent through email which are refers are virus and has the capacity to harm the computer and its working (Roussey, 2017).
Vulnerabilities
The likelihood is calculated using the following formula,
Likelihood= Threat * Vulnerability
Likelihood = High
Virtual Server
Likelihood = Medium
Authentication Server
Likelihood = High
Customer Database
Likelihood = High
Web Server
Likelihood = High
Mail Server
Likelihood = High
Impact Table (related to CloudXYZ)
High |
Long-term impact |
Medium |
Short term impact |
Low |
No or low impact |
The risk is calculated using the following formula,
Risk = High
Threat Level
Threat |
Level |
ID |
Data Breaches |
High |
Th1 |
Data loss |
Medium |
Th2 |
Malicious Insider attacks |
High |
Th3 |
Lack of visibility |
Medium |
Th4 |
Traffic control |
High |
Th5 |
Natural disasters |
Low |
Th6 |
Sniffing and Spoofing |
Medium |
Th7 |
Data leakage |
Medium |
Th8 |
Denial of Service |
High |
Th9 |
Web application Security |
High |
Th10 |
database security threats |
High |
Th11 |
Coding errors |
High |
Th12 |
Security holes |
High |
Th13 |
Sensitive file |
Medium |
Th14 |
Spam |
Low |
Th15 |
Hoaxes |
Low |
Th16 |
Fake emails |
Low |
Th17 |
Missed Security Patches |
Medium |
Th18 |
Hacking/ outsider attacks and Viruses |
High |
Th19 |
Hardware failure |
Medium |
Th20 |
Software failure |
Medium |
Th21 |
Competitors |
High |
Th22 |
The identified threats are Data Breaches, Data loss, Malicious Insider attacks, Lack of visibility, Hypervisor Security, Sniffing, Spoofing, Denial of Service, Web application Security, database security threats, Coding errors, Security holes, Sensitive file, Spam, Hoaxes, Fake emails, Missed Security Patches, Hacking/ outsider attacks and Viruses.
Asset ID & Threat ID |
Vulnerability ID |
Level |
CS & Th1 |
CVE-2017-1375 |
High |
CS & Th2 |
CVE-2017-1304 |
Medium |
VS & Th5 |
CVE-2017-6160 |
Medium |
VS & Th9 |
CVE-2017-6159 |
Medium |
AS & Th9 |
CVE-2017-16025 |
Medium |
AS & Th8 |
CVE-2018-7942 |
High |
CD & Th10 |
CVE-2008-6761 |
High |
CD & Th11 |
CVE-2005-4515 |
High |
WS & Th12 |
CVE-2018-2893 |
critical |
WS & Th13 |
CVE-2018-0340 |
Medium |
MS & Th19 |
CVE-2017-14077 |
Medium |
MS & Th15 |
CVE-2016-9127 |
High |
FW & Th18 |
CVE- 2018-0227 |
High |
FW & Th9 |
CVE-2018-8873 |
High |
I & Th19 |
CVE-2018-0978 |
High |
I & Th8 |
CVE-2018-1025 |
Medium |
The identified risks are mentioned below:
Coding errors |
DoS |
Data Breaches and Data loss |
Web application Security |
Database security threats |
Security holes |
Missed Security Patches |
Hacking/ outsider attacks and Viruses |
Traffic control and Data leakage |
Spam |
The advantages of risk assessment is understood from this report and it is recommended to choose effective method for risk assessment. As, this will help to find the future impacts and security threats for the network. The threats and vulnerabilities for all the assets are identified. The likelihood is calculated. The impact is determined for each asset. Then, the risks are identified. Thus, the recommendation is that, an effective network should be created in the organization, by utilizing extremely valuable cloud storage as well as virtual server (Granneman, 2012).
Conclusion
It is determined that risk assessment helps to determine the answers for the questions like- What must be protected? What are the vulnerabilities and threats? What are its implications? What value it has to the organization? and what could decrease the damages? The ISO 27001 based Risk Assessment Tool is considered as an effective solution. The CVE based vulnerabilities are considered here, to help the process of performing risk assessment for the provided security network architecture. Impact analysis and likelihood are the other tasks which will be performed during the risk assessment on the given system. The risk assessment method is believed to provide right suggestions related to system’s security, integrity and confidentiality. The threats and vulnerabilities for all the assets are identified. The likelihood is calculated, next the impact is determined for each asset. Finally, all the risks are determined. The likelihood is calculated using the formula, Likelihood= Threat * Vulnerability. The threat level is also determined. Then, the risk is calculated using the formula, Risk= Impact * Likelihood.
References
Cve.mitre.org. (2018). CVE -Requirements and Recommendations for CVE Compatibility (Archived). [online] Available at: https://cve.mitre.org/compatible/requirements.html [Accessed 3 Aug. 2018].
Granneman, J. (2012). Virtualization vulnerabilities and virtualization security threats. [online] SearchCloudSecurity. Available at: https://searchcloudsecurity.techtarget.com/tip/Virtualization-vulnerabilities-and-virtualization-security-threats [Accessed 4 Aug. 2018].
Networkmagazineindia.com. (2002). Identifying and classifying assets. [online] Available at: https://www.networkmagazineindia.com/200212/security2.shtml [Accessed 4 Aug. 2018].
Nvd.nist.gov. (2018). NVD – Results. [online] Available at: https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=Virtual+Server&search_type=all [Accessed 3 Aug. 2018].
Roussey, B. (2017). Real threats in virtualized environments: Identifying and mitigating the risks. [online] TechGenix. Available at: https://techgenix.com/virtualization-risks/ [Accessed 4 Aug. 2018].
Securitycommunity.tcs.com. (2017). 10 Major Security Threats in Cloud Computing. [online] Available at: https://securitycommunity.tcs.com/infosecsoapbox/articles/2017/02/14/10-major-security-threats-cloud-computing [Accessed 4 Aug. 2018].
Support.symantec.com. (2011). Primary and secondary assets. [online] Available at: https://support.symantec.com/en_US/article.HOWTO40975.html [Accessed 4 Aug. 2018].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download