The final project is a comprehensive assessment of all the topics…

Question Answered step-by-step The final project is a comprehensive assessment of all the topics… The final project is a comprehensive assessment of all the topics covered during this course. A risk scenario is provided below, and students are required to complete both the risk evaluation and mitigation plan sections of the report.The final project summarizes each of the individual assignments that were completed during this course. Start by reading a brief description of the organization and some identified issues in the risk scenario. The details of the organization have been left vague to allow each student the flexibility to fill in the gaps as they wish. From the risk scenario, identify and rate any three risks. In the risk description, make it clear which resource is at risk, and which threat/vulnerability pair is being evaluated. Use the sensitivity, severity and likelihood scales from Appendix B in the book (Tables 4.2, 6.11 and 6.12) to evaluate each finding. A mapping table is provided (Figure 6.3) to calculate the Risk Exposure value for each combination of sensitivity/severity/likelihood.Then determine the appropriate mitigation plan for each risk, including who it should be assigned to and a proposed date for completion.After you have completed the analysis of the risks and proposed mitigation plans, write a short executive summary to summarize your findings. This should be no longer than 1 page. Keep in mind your audience when writing the executive summary; it should be tailored for senior managers who are not technical. You should write the executive summary last, but it should be the first page of your risk report.   Risk ScenarioHigher Education Institution? There are 25 wireless access points which are consumer devices each configured separately? Student ID numbers are the individuals social security number (or International Identifying Number like a Passport Number)? All servers are together on a single network. This includes email, web, file servers, database servers, and their credit card processing server.? Servers are put online and taken down regularly by different groups and individuals in the organization? A complex set of ACL’s is used at the core switch to control traffic between student networks? The server that hosts the student records SQL database, which includes things like the students SSN, is protected using BitLocker file system encryption? Records related to students and faculty are kept for archiving purposes indefinitely ? Unrestricted Internet access is available from any system? The school psychologist stores patient files on the faculty file server? Access to the data center is restricted using a traditional key? Admin accounts on the servers and workstations are still using the default passwords. ? Students and faculty can use any personal devices on the network? Instant Messaging is allowed and regularly used for business and personal  Risk Evaluation Worksheet# Risk Description (Asset, Threat, and Vulnerability) Sensitivity Severity Likelihood Risk0Sensitive account information is discarded in the regular trash, which could lead to disclosure of customer financial accounts to unauthorized internal or external parties. Disclosure of this data violates several state privacy laws.High High Moderate High1___________________________________________________________________________________________________________________________________________________________________________________________________________________________ ____________ ____________ ____________2___________________________________________________________________________________________________________________________________________________________________________________________________________________________ ____________ ____________ ____________3___________________________________________________________________________________________________________________________________________________________________________________________________________________________ ____________ ____________ ____________  Risk Mitigation PlansFinding 0: Owner Action: Buy a shredder and install in convenient location, and publish a handling policy By Whom: Administrative Staff and Senior Management When: By end of Q2 2012Finding 1: Owner Action: ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________By Whom: _________________________________________________________ When: ____________________________________Finding 2: Owner Action: ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________By Whom: _________________________________________________________ When: ____________________________________  Finding 3: Owner Action: ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________By Whom: _________________________________________________________ When: ____________________________________      Image transcription textPage < 3 of 5 ZOOM + k RiskEvaluation Worksheet # RiskDescription (Asset, Threat... Show more... Show moreImage transcription textPage < 4 of 5 ZOOM + RiskMitigation Plans Finding 0: OwnerAction: Buy a shredder an... Show more... Show more  Engineering & Technology Industrial Engineering Operations Management ITC 6315 Share QuestionEmailCopy link Comments (0)