Risk Managment Plan

Read Complete Research Material

RISK MANAGMENT PLAN

Risk Managment Plan

Risk Management Plan

Goa (1999) discuss various issues related to cyber attack processes. Presents a series of recommendations that were followed in this audit process. He advocated the use of trains, in which audit logs of system activities will be reviewed. additional audit mechanisms to Goa (1999) recommends monitoring operating system commands: "Looking for hidden processes, control of log files and try backdoor passwords are among the multitude of manual techniques, system administrators can the system run commands are available "(p. 50). Sandhu and Samarati (1996) also proposed a test method similar to that proposed by Goa (1999), which involves collecting data on the activities of the system to find traces of intrusion or author. On the other hand, argued Goa (1999) that "the evidence must be collected and analyzed in time, to improve the chances to detect an intrusion before significant damage takes place or before the way through the intruder left is cold" (p. 50 ). This recommendation is to enable effective for early detection of threats before damage is dealt, or a threat than an attack about. Often, the cyber attackers poll the network for some time before the creation of a malicious action (Hamin, 2000).

Therefore, the testing methodology employed in this case included the collection of data on the activities and analysis system based on the methodology proposed in Goa (1999), and Sandhu and Samarati (1996).

The audit carried out by Ms Maya tries to uncover the activities of the attacker after the fact. Since in this case, the test cyber-attack is often used to provide legal evidence of the Justice (Hamin, 2000). Consequently, audit mechanisms are used to cyber-attack forensic strict penalties for criminals and not as a preventive measure (Hamin, 2000, Schneier and Kelsey, 1999). In line with the recommendations of Goa (1999), and Sandhu and Samarati (1996), a set of system tools, log files (event logs) and access control mechanisms were reviewed in the server hosting the e-learning system. The results were reported to Ms. Rodriguez and Dr. Lopez.

The results of safety testing and recommended two action plans presented by Mrs

Maya, the consulting company, the president of the University of Kansas, Dr. Lopez, and KU IT manager, Mrs. Rodriguez, about two weeks after the discovery of a cyber attack against the system of e-learning KU.

In an interview with Ms. Rodriguez, it was announced that the network administrator

fired a few weeks before the attack software. Accordingly, Ms. Rodriguez filled

in the position of Network Administrator. Having received no formal training in management and network servers, Ms. Rodriguez does not maintain the present functions of the network. While the former network administrator, Mr. Perez user names and passwords for administrator account to Ms. Rodriguez has made no efforts have been made to change it from your system passwords or change permissions access systems. Neither the server nor the network

was protected by a firewall mechanism. The Court seems not to have a physical security

Entry system. The servers were not sure were to a rack-mounted servers and ...