Risk Management paper Produce a risk assessment of the scenario

Risk Management paper Produce a risk assessment of the scenario

Produce a risk assessment of the scenario given using the steps outlined. Ensure you cover all the steps in the risk assessment process and ensure you use the risk assessment tools.

Steps Used in Risk Assessments

Identify assets and activities to address

Identify and evaluate relevant threats

Identify and evaluate relevant vulnerabilities

Identify and evaluate countermeasures

Assess threats, vulnerabilities, and exploits

Evaluate risks

Develop and present recommendations

RISK ASSESSMENT

Scenario:

A research organization wants to set up a secure collaboration portal site for their partners and customers. In the existing structure each external DMZ application has its own authentication system, and user administrators with no connection to other applications. The collaboration portal site provides an identity service and a common entry portal for collaboration. The system would trust users across organizations into specific applications they were authorized to view.

The system should (see Case Study 3 Diagram and Business Model Canvas attachments):

• connect their existing DMZ prototype applications to their customers through this entry point

• centralize the user identity management and user experience with the organization

• provide a secure way for partners and customers to have a single sign on experience

• identify users with different levels of trust depending on credentials provided.

• create visibility into the social interactions for better resource management

Produce a risk assessment of the scenario above using the steps outlined on Slide 18 of Lecture 6. Ensure you cover all the steps in the risk assessment process and ensure you use the risk assessment tools discussed in our lectures.

The papers are to be 4 to 6 pages in length and will reflect research conducted by the student and an analysis that is in the students own words. All references to other work must be properly cited (the use of un-cited work that is not by the student is an academic violation). The papers are to be submitted as attachments in the “Assignment Dropbox” area of the class Blackboard site under the appropriate case study assignment. The paper should be submitted electronically as a Microsoft Word document using APA format. Citation references should be listed as footnotes.

The paper should have the following structure:

1. Abstract
2. Key Terms
3. Introduction
4. Analysis
5. Conclusion
6. References

Order from us and get better grades. We are the service you have been looking for.