ITM527 Mod SLP: Risk Assessment of Operation Security Domain
Module 1 - SLP
Risk Assessment
The following two examples demonstrate how risk assessment can be conducted in certain situations. Read briefly to get some basic ideas.
NIST (2010). Piloting Supply Chain Risk Management Practices for Federal Information Systems.
CDS Case Study. Making Information Risk Mitigation Decisions. Vincent Larcote Case Series. Case #6-0029. Center for Digital Strategies. Tuck School of Business at Dartmouth.
Practicing risk assessment fundamentals, processes and matrixes to one's own experiences offers an opportunity to apply the learning in the real world. Can you choose a particular information system security domain of your organization or industry and apply what you learned from the case readings and SLP examples? You can choose to assess comprehensively, or you can choose not to cover all the aspects of risk assessment but to focus on two or three major perspectives and go much more in depth.
SLP Assignment Expectations
Please write a 2-5 page paper titled:
"Risk Assessment for ______ (your chosen information system security domain in your chosen organization/industry): Challenges and Solutions"
Please address the following issues:
1. Special requirements of risk assessment in your chosen information system security domain in your chosen organization/industry if there are any.
2. Two or three major perspectives of risk assessment that you choose to go in depth to discuss.
3. One or two major lessons learned from the examples that you'd like apply in your own risk assessment issue here.
4. Key challenges and solutions of risk assessment.
Your assignment will be graded according to the MSITM SLP Grading Rubric, which aligns with the following expectations. (To see the rubric, go to Assessments>Rubrics. Click the arrow next to the rubric name and choose Preview.)
• Please use original writing (No Plagerism)
• Please use American URLs that can be easily verified on the web on the reference page.
• Please include the page numbers in the in text references; APA style.
• Read the background material in the attachment titled Background
• The organization is the department of the Army / Industry Federal government
Risk Assessment of Operation Security Domain
Name
Institutional Affiliation
Risk Assessment of Operation Security Domain
Department of Defense operations security is a critical area where information should be prevented from leaking to inappropriate personnel. The mostly affected information security domain is the operations security domain. The information security system of the army department of defense is a critical area where systems’ vulnerability to malware and illegal access may be disastrous for the department. The army operations security domain deals with implementing reasonable protections and control department resources, software and hardware. In the domain, it is critical that information systems are maintained through establishing appropriate programs for monitoring, auditing and evaluation of vulnerabilities and threats to department information systems (NIST, 2010).
The development of security architecture in the department calls for a keen understanding of the whole information system from the system configuration, hardware, and software. The information system for any department of defense contains sensitive security information that can be exposed to vulnerabilities, risks, and threats. The need for risk assessment traverses understanding of the operations security domain, such that architecture issues are addressed by applying appropriate controls and safeguards measures. Securing information systems start with protecting information systems. In the operations security area, the risk assessment is described regarding development system routine. The main issues that risk assessment in the domain is concerned with include access control, confidentiality, availability and integrity. The special requirements for the risk assessment of the operation security field is risk control and security architecture models.
Security Architecture
The three security architecture models in the domain include access control, information flow, and integrity. One important aspect of the access control of the domain of operation security is cryptography, where the only information transmitted, can be accessed and read by the intended person. The transmitted information is only readable to a suitable individual using encryption of the ciphertext (Walsh, 2009). IT is the only way of safeguarding the integrity and confidentiality of the transmitted data. The risk assessment factors include system feasibility which incorporates the identification of information systems security requirements together with regulatory elements, security standards, and internal policies. The associated risks, vulnerabilities, and threats affect the operations security domain. It is the second stage of any development cycle where software plans are made to facilitate completion of cost-benefit evaluation and analysis (Dougherty, 2010). It is the onset of planning appropriate protection level. The other important aspect of operation security is product design that entails planning security specifications such as encryption and access control provisions. The level of risk is thus determined by the intensity and the type of encryption required. In the domain of security, the underlying risks to a security system can be mitigated quickly if there is a proper monitoring of the security systems and software so as to determine any changes in the domain controls. The freshly discovered risks and vulnerabilities are assessed against the existing controls such that it is ...
👀 Other Visitors are Viewing These APA Essay Samples:
-
ITM437 Information Security and Technology module 1 - Case SOURCES OF SECURITY THREATS: HUM...
4 pages/≈1100 words | 6 Sources | APA | Technology | Coursework |
-
Cryptography and Digital Forensics Discussion Questions
1 page/≈275 words | 5 Sources | APA | Technology | Coursework |
-
Module 1 Case Assignment Coursework: Database Management
6 pages/≈1650 words | 6 Sources | APA | Technology | Coursework |