You have been hired as an information security analyst at

You have been hired as an information security analyst at a small company called Astounding Appliances. The company sells appliances online. Astounding Appliances owns and hosts all of its IT assets and forward-facing web applications on site. The assets are about 5 years old. The company is seeking to expand its operations in the next 5 years. 

Your manager asks you to help her document the threats and vulnerabilities to the company’s IT operations. In addition to what you already know about the company, you learn the following during your interviews and inspections for this project.

The Astounding Appliances company and all of its IT operations are located in New Orleans, Louisiana. The data center is located on the ground floor of the company’s building. There is no basement. No one can come into the data center without a smart card scan. However, there is a physical key system that can override the smart card scanner and access. There is no inventory of who has keys to the data center, although the company’s vice president for operations doesn’t think that too many people have keys.

Because New Orleans is vulnerable to hurricanes, all of the equipment in the data center is stored in elevated racks that sit on a raised floor. Pumps have also been installed to remove water. The pumps are attached to a generator, which has not been inspected in several years. You learn that it has not been inspected in a timely manner because making sure the generator is functional is not on the organization’s disaster recovery checklist.

From the director of human resources, you learn that any Astounding Appliances employee with a valid smart card can enter the data center; access is not granted based on a need to enter the data center. You also learn that smart card access is not always terminated promptly when employees leave Astounding Appliances. The director of human resources tries to audit smart card validity regularly, but this is a low-priority task for her. You also learn that it is not part of the regular employment process for new employees to complete information security training or to sign the company’s IT acceptable use policy.

Answer below:

1. Identify 6-10 vulnerabilities to Astounding Appliances information systems and data. Be sure to include the asset that is affected by the vulnerability.

2. For each vulnerability that you have already identified, document potential threats associated with it. Be sure to list the relevant information security concern (i.e., confidentiality, integrity, or availability) for the vulnerability-threat pair.

3. For each vulnerability-threat pair, identify the relevant information security concern(s) (i.e., confidentiality, integrity, or availability).

4. For each vulnerability-threat pair, identify the vulnerability category.

5. For each vulnerability-threat pair, identify the threat category.

500 words

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Machine learning questions. 4 questions. look at attached  1. Please construct a new dataset by either adding two independent variables or removing two

Machine learning questions. 4 questions. look at attached  1. Please construct a new dataset by either adding two independent variables or removing two independent variables from finalsample.dta dataset. If you choose to add two independent variables, you could add any two independent variables that you think help explain stock returns. If you choose to remove two independent variables, you

Instructions are attached  supporting doc attached  Presenter’s Name: Gregory

Instructions are attached  supporting doc attached  Presenter’s Name: Gregory Swim Person Providing Critique: Brianna Davis Component Comments Case summary: Case was summarized in a succinct, easy-to-understand manner and was in the presenter’s own words. I understood the issue confronting the Supreme Court. APA’s brief: The APA’s stance was presented in

Instructions are attached  supporting doc attached  Presenter’s Name: Lila Davis

Instructions are attached  supporting doc attached  Presenter’s Name: Lila Davis Person Providing Critique: Brianna Davis Component Comments Case summary: Case was summarized in a succinct, easy-to-understand manner and was in the presenter’s own words. I understood the issue confronting the Supreme Court. APA’s brief: The APA’s stance was presented in

Please see the file attached Online Social Media Principles (12/2/09)  Online Social Media

Please see the file attached Online Social Media Principles (12/2/09)  Online Social Media Principles INTRODUCTION  Every day, people discuss, debate and embrace The Coca‐Cola Company and our brands in thousands of online  conversations. We recognize the vital importance of participating in these online conversations and are  committed to ensuring that we participate in online social media the right way. These Online Social Media  Principles have been developed to help empower our associates to participate in this new frontier of  marketing and communications, represent our Company, and share the optimistic and positive spirits of our  brands.  The vision of the Company to achieve sustainable growth online and offline is guided by certain shared values  that we live by as an organization and as individuals:  • LEADERSHIP: The courage to shape a better future;  • COLLABORATION: Leveraging our collective genius;   • INTEGRITY: Being real;  • ACCOUNTABILITY: Recognizing that if it is to be, it’s up to me;   • PASSION: Showing commitment in heart and mind;   • DIVERSITY: Being as inclusive as our brands; and   • QUALITY: Ensuring what we do, we do well.  These Online Social Media Principles are intended to outline how these values should be demonstrated in the  online social media space and to guide your participation in this area, both when you are participating  personally, as well as when you are acting on behalf of the Company. It is critical that we always remember who  we are (a marketing company) and what our role is in the social media community (to build our brands).  The  same rules that apply to our messaging and communications in traditional media still apply in the online social  media space; simply because the development and implementation of an online social media program can be  fast, easy, and inexpensive doesn’t mean that different rules apply.  The Company encourages all of its associates to explore and engage in social media communities at a level at  which they feel comfortable. Have fun, but be smart. The best advice is to approach online worlds in the same  way we do the physical one – by using sound judgment and common sense, by adhering to the Company’s  values, and by following the Code of Business Conduct and all other applicable policies.   COMPANY COMMITMENTS  The Company adheres strongly to its core values in the online social media community, and we expect the same  commitment from all Company representatives – including Company associates, and associates of our agencies,  vendors and suppliers. Any deviation from these commitments may be subject to disciplinary review or other  appropriate action.  The Five Core Values of the Company in the Online Social Media Community