Essay Help Services

Risk Assessment Matrix

Home Assignment Answers Risk Assessment Matrix

What is Risk?

Risk can be defined as probability or threat of action which lead to damage, injury or cause loss to individual or organization due to external or internal vulnerabilities. The digit advancement is changing the ways of standard living and providing changes new and innovative technologies. However, digital security can be defined as protection of virtual identity.

Impact of risk

The cybercriminals are trying new ways to violate the individual identity over virtual platform for personal gains. The main objective of digital security risk is to exploit confidentiality, integrity and availability, so that personal identity of individual can be defamed.

Risk assessment

Some types of digital security risks are enlisted below along with mitigation measures:

Security risk

Description

Impact

Likelihood

Mitigation measure

Third party attacks

In these types attacks occur when attacker infiltrates system from any outsider partner of organization. The attacker attempts to steal confidential information from organization system and use them for its personal gains. Therefore, organization to overlook each and perspective for organization. 

High

Low

The organization is recommended to properly oversight facilities which are been provided by third-party organization. Moreover, login audits files need to properly managed so that organization can keep record, have accessed the device and information from where and exploited which potion of information. 

Phishing attack

In these technique, attackers aim to gather personal information of individual with the help of deceptive e-mail or website. The main goal of the attacker is to fool recipient, by masquerading their identity so that recipient fills it credential information which are directly send to attacker.   

High

High

In order to mitigate phishing attack, users are recommended to proof read the URL’s in e-mail before filling credential information on email. If any individual receives any malicious e-mail rather than replying e-mail back, individual need to research about source of that e-mail.  

Ransomware Attack

Ransomware is a simpler form of malware that breaches out system defenses and locks down users’ computers using strong encryption. Then, attackers demand ransom from victim in exchange for digital keys to unlock their data. Ransom is demanded by attackers in the form of cryptocurrency, as it cannot be easily traceable. Thousands of computers are compromised with various strain such as WannaCry and PetyaCry.

High

Medium

Impact of the ransomware is high and it needs to be taken care by individuals. With the use of proper firewall and network security protocol into the system one can mitigate these kind of attacks in an effective manner. The users do not have to open suspicious links and file onto their computers as it may contains some malicious codes that could locks down the computer.

Denial of Service

A denial of service is type of attack where owner does not allow to use their own data. In this attack, attackers attempt to prevent legitimate users from accessing the services. Usually, the attacker sends excessive message asking the server or network to authenticate requests, which have invalid return address. It can cause great loss of the organization as well as the individuals.

Low

Low

With the implementation of dotDefender web application one can mitigate Dos attack in an effective manner. dotDefender is a type of firewall that inspect traffic of HTTP and checks packets are transferring securely or not. It deny protocols, ports, IP addresses in order to stop web applications from being attacked.

 Risk register (ANSI B11.0.TR3 risk assessment matrix)

 

Impact

Likelihood

High

Medium

Low

High

Phishing  

 

Third party attack

Medium

 

Ransomware

 

Low

 

 

Denial of service

 

Search Here

Order Now

Latest Reviews

Facebook

Payments And Security