Refer to Devil’s Canyon, Part A in Wk 4. Using the potential risks for Devil’s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team. In your matrix, you should: D

Do you need academic writing help with your homework? Let us write your papers.


Order a Similar Paper Order a Different Paper

Refer to Devil’s Canyon, Part A in Wk 4.

Using the potential risks for Devil’s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team. In your matrix, you should:

Describe briefly each of the identified risks/threats.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Evaluate the security controls that mitigate each of the risks/threats identified.

Provide a rationale for how each of the controls identified mitigates the risk to an acceptable level.

Research and describe the security technologies and security design that can be used to mitigate each of the identified information security risks.

Refer to Devil’s Canyon, Part A in Wk 4. Using the potential risks for Devil’s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team. In your matrix, you should: D
Policies, Plan, and Risk Policies play a significant role in the implementation of security plans that organizations have. After various vulnerabilities have been identified, employees and other stakeholders of Devil’s Canyon Enterprise will need a set of procedures that will guide them in the implementation stage. Without policies, any strategy that the management creates will not have a clear pathway to its success (Furnell et al., 2016). Procedures are required to assign roles and responsibilities to each worker in the security protocols being created. Policies also pinpoint the enterprise’s risk appetite, ensuring it stays within its limit both financially and managerial. Some of the procedures needed include password policies, physical security policies, data privacy policies, and incident response policies. Security plans and strategies are vital for the successful implementation of the security needs of a company. The enterprise can only achieve operational efficiency if a comprehensive method includes every business process that Devil’s Canyon Enterprise is involved in to make a profit. The security plan ensures all leaders and managers are accountable for the decisions they make in the process. Without a plan, the funds set aside by being lost through fraudulent activities and must, therefore, be well managed (Furnell et al., 2016). If there are any service providers needed, they must be obtained by management from a reputable organization that has positive reviews from the IT industry. The plan will ensure communication between service providers, employees, and the is flawless. Threats of the Enterprise Some of the threats the enterprise will face include insider threats. It occurs when rogue employees intentionally steal, share, and manipulate sensitive information leading to loss of the business’s reputation. It can also be unintentional when employees do not comply with the set rules and regulations, exposing the company to hackers. Protecting the enterprise from rogue employees must be a priority; management must ensure that the employees’ comprehensive education and training occur (Jail et al., 2019). Any rogue employees must be timely removed from the enterprise or disciplinary actions taken accordingly. A two-factor authentication technique should be applied. An employee’s functions must also be mapped by management to their operations to prevent misuse (Jail et al., 2019). Viruses and malware are a threat to the organization. The IT team must use the latest software and hardware system to counter them. Physical security of IT resources is a threat that can lead to losses. Therefore, they must be kept behind healthy locks and hinges using authentication systems to deter unauthorized access. Phishing attacks occur when hackers employ tricks that lead to sensitive information being shared. Hackers might send a photo or an email to users. If the user opens it, it releases malware installed into a system and waits to access courses. Ransomware threats occur when hackers lock users at the enterprise until they pay a fee (Kurpjuhn, 2019). The hackers prefer virtual currencies as authorities cannot track them. Devil’s Canyon can protect itself by updating all its systems and educate employees not to visit suspect sites. The IT team must also set up firewalls to monitor the users with access to the system closely. Therefore, Devil’s Canyon will effectively protect itself by identifying mitigation strategies that fit into their system. The enterprise’s management must implement a decentralized leadership network to ensure quick decision-making when threats are identified. It will also give them enough time to focus on the business’s core functions, leading to increased productivity. Table Representing Risks RISK PROBABILITY OF OCCURRENCE IMPACT (LOW, MEDIUM, HIGH) RISK RATINGS INSIDER ATTACKS MEDIUM HIGH HIGH VIRUS AND MALWARE LOW MEDIUM LOW PHYSICAL SECURITY LOW HIGH MEDIUM PHISHING MEDIUM HIGH HIGH RANSOMWARE MEDIUM HIGH HIGH References Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access, 7, 82721-82743. Kurpjuhn, T. (2019). The guide to ransomware: how businesses can manage the evolving threat. Computer Fraud & Security, 2019(11), 14-16. Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. computers & security, 56, 70-82.

Our team of vetted writers in every subject is waiting to help you pass that class. With keen editors and a friendly customer support team, we guarantee custom-written, original, high-quality papers. Get top grades.


Order a Similar Paper Order a Different Paper