Create a company risk assessment matrix fo
Following the example found here, create a company risk assessment matrix for your present or previous employer.
H2a_Risk_assessment_Matrix.xlsx
Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.
Vulnerability
WEIGHT: N/A=Not Applicable 1=Very Low 2=Low 3=Medium 4=High 5=Very High | |||
VULNERABILITY | WEIGHT | RATIONALE | |
1 | Inadequate Security Policy | 2 | |
2 | Inadequate Training | 2 | Training is offered |
3 | Inadequate System Administration | 2 | Certified administrator with backup person assigned |
4 | Inadequate User Account Management | 2 | ISSO appointed |
5 | Inadequate Personnel Management | 3 | |
6 | Incomplete Contingency Plan | 1 | Contingency Plan in place |
7 | Disclosure of Data | 4 | |
8 | Modification of Data | 5 | |
9 | Unlimited Access to Data | 2 | One root account |
10 | Objects Not Cleared Before Reuse | 1 | |
11 | Inadequate Warning Banners | 1 | |
12 | Use of Replayable I&A | 2 | Password encrypted, only one session permitted |
13 | Password Vulnerability to Cracking | 5 | Much effort but a lot to gain |
14 | Sharing of ID or Passwords | 2 | No concurrent sessios; Rules of Behavior in place |
15 | Session Timeout on Server | 2 | Cookies time out after 20 minutes |
16 | Concurrent Logon Sessions Permitted | 2 | |
17 | Inadequate Audit Log | 1 | |
18 | Inadequate Audit Analysis | 3 | Relying on human analysis |
19 | Data Transmissions in the Clear | 5 | SSL |
20 | Susceptibility to Line Tapping | 5 | SSL |
21 | Inconsistent Physical Perimeter Definition | 2 | |
22 | Inadequate CM – Development | 2 | |
23 | Inadequate CM – Operations / Maintenance | 2 | |
24 | Facility Unavailability | 3 | Limited physical access |
25 | Data Unavailability | 1 | Availability of data is relatively low. |
26 | System / Component Unavailability | 3 | |
27 | Unstable / Insufficient Communication Medium | 4 | Outages occur |
28 | Inadequate / Missing Documents | 1 | COOP in place |
29 | Failure to Achieve and Maintain Accreditation | N/A | |
30 | Inadequate Protection of Web Server | 5 | |
N/A | |||
1 | |||
2 | |||
3 | |||
4 | |||
5 |
&"Courier,Regular"&14SENSITIVE // FOR OFFICIAL USE ONLY &"Times New Roman,Bold"&E&F
Page &P of &N &"Courier,Regular"&12SENSITIVE // FOR OFFICIAL USE ONLY &D
Threats
WEIGHT: N/A=Not Applicable 1=Very Low 2=Low 3=Medium 4=High 5=Very High | |||
T H R E A T | WEIGHT | RATIONALE | |
Deception | |||
1 | False Denial of Origin | 2 | |
2 | False Denial of Receipt | 2 | |
3 | Falsification | 4 | |
4 | Insertion | 3 | |
5 | Malicious Logic-Masquerade | 3 | |
6 | Masquerade | 2 | |
7 | Repudiation | 2 | |
8 | Substitution | 4 | |
Disruption | |||
9 | Hardware or Software Error-System | 1 | |
10 | Hardware or Software Error-Data | 1 | |
11 | Human Error | 3 | |
12 | Environmental Failure | 3 | |
13 | Incapacitation | 1 | |
14 | Interference | 4 | |
15 | Malicious Logic-Corruption | 2 | |
16 | Malicious Logic- Disabling | 3 | |
17 | Natural Catastrophe | 1 | |
18 | Overload | 4 | |
19 | Physical Destruction | 1 | |
20 | Tampering-Corruption | 5 | |
Usurpation | |||
21 | Malicious Logic-Misuse | 5 | |
22 | Misappropriation | 5 | |
23 | Misuse | 5 | |
24 | Tampering-Misuse | 5 | |
25 | Theft of Data | 4 | |
26 | Theft of Service | 4 | |
27 | Violation of Permissions | 2 | |
Disclosure | |||
28 | Cryptanalysis | 2 | |
29 | Eavesdropping | 5 | |
30 | Exposure | 3 | |
31 | Hardware or Software Error-System Failure | 1 | |
32 | Human Error-Unintentional | 2 | |
33 | Inference | 5 | |
34 | Interception | 5 | |
35 | Intrusion | 5 | |
36 | Penetration | 2 | |
37 | Reverse Engineering | 2 | |
38 | Scavenging | 2 | |
39 | Theft | 1 | |
40 | Traffic Analysis | 3 | |
41 | Trespass | 3 | |
42 | Wiretapping | 4 | |
N/A | |||
1 | |||
2 | |||
3 | |||
4 | |||
5 |
&"Courier,Regular"&12SENSITIVE // FOR OFFICIAL USE ONLY&"Arial,Bold"&14&E &F
Page &P of &N &"Courier,Regular"&12SENSITIVE // FOR OFFICIAL USE ONLY &D
Risk Computation
Vulnerabilities | Inadequate Security Policy | Inadequate Training | Inadequate System Administration | Inadequate User Account Management | Inadequate Personnel Management | Incomplete Contingency Plan | Disclosure of Data | Modification of Data | Unlimited Access to Data | Objects Not Cleared Before Reuse | Inadequate Warning Banners | Use of Replayable I&A | Password Vulnerability to Cracking | Sharing of ID or Passwords | Session Timeout on Server | Concurrent Logon Sessions Permitted | Inadequate Audit Log | Inadequate Audit Analysis | Data Transmissions in the Clear | Susceptibility to Line Tapping | Inconsistent Physical Perimeter | Inadequate CM – Development | Inadequate CM – Operations | Facility Unavailability | Data Unavailability | System / Component Unavailability | Unstable / Insufficient Communication | Inadequate / Missing Documents | Failure to Achieve and Maintain Accreditation | Inadequate Protection of Web Server | |||
Threats | Wts. | 2 | 2 | 2 | 2 | 3 | 1 | 4 | 5 | 2 | 1 | 1 | 2 | 5 | 2 | 2 | 2 | 1 | 3 | 5 | 5 | 2 | 2 | 2 | 3 | 1 | 3 | 4 | 1 | N/A | 5 | Risk Total for Threat | Percent of Total Risk |
Deception | |||||||||||||||||||||||||||||||||
False Denial of Origin | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
False Denial of Receipt | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
Falsification | 4 | 8 | 8 | 8 | 8 | 12 | 4 | 16 | 20 | 8 | 4 | 4 | 8 | 20 | 8 | 8 | 8 | 4 | 12 | 20 | 20 | 8 | 8 | 8 | 12 | 4 | 12 | 16 | 4 | 20 | 300 | 3% | |
Insertion | 3 | 6 | 6 | 6 | 6 | 9 | 3 | 12 | 15 | 6 | 3 | 3 | 6 | 15 | 6 | 6 | 6 | 3 | 9 | 15 | 15 | 6 | 6 | 6 | 9 | 3 | 9 | 12 | 3 | 15 | 225 | 2% | |
Malicious Logic | 3 | 6 | 6 | 6 | 6 | 9 | 3 | 12 | 15 | 6 | 3 | 3 | 6 | 15 | 6 | 6 | 6 | 3 | 9 | 15 | 15 | 6 | 6 | 6 | 9 | 3 | 9 | 12 | 3 | 15 | 225 | 2% | |
Masquerade | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
Repudiation | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
Substitution | 4 | 8 | 8 | 8 | 8 | 12 | 4 | 16 | 20 | 8 | 4 | 4 | 8 | 20 | 8 | 8 | 8 | 4 | 12 | 20 | 20 | 8 | 8 | 8 | 12 | 4 | 12 | 16 | 4 | 20 | 300 | 3% | |
Disruption | |||||||||||||||||||||||||||||||||
Hardware or Software Error-System | 1 | 2 | 2 | 2 | 2 | 3 | 1 | 4 | 5 | 2 | 1 | 1 | 2 | 5 | 2 | 2 | 2 | 1 | 3 | 5 | 5 | 2 | 2 | 2 | 3 | 1 | 3 | 4 | 1 | 5 | 75 | 1% | |
Hardware or Software Error-Data | 1 | 2 | 2 | 2 | 2 | 3 | 1 | 4 | 5 | 2 | 1 | 1 | 2 | 5 | 2 | 2 | 2 | 1 | 3 | 5 | 5 | 2 | 2 | 2 | 3 | 1 | 3 | 4 | 1 | 5 | 75 | 1% | |
Human Error | 3 | 6 | 6 | 6 | 6 | 9 | 3 | 12 | 15 | 6 | 3 | 3 | 6 | 15 | 6 | 6 | 6 | 3 | 9 | 15 | 15 | 6 | 6 | 6 | 9 | 3 | 9 | 12 | 3 | 15 | 225 | 2% | |
Environmental Failure | 3 | 6 | 6 | 6 | 6 | 9 | 3 | 12 | 15 | 6 | 3 | 3 | 6 | 15 | 6 | 6 | 6 | 3 | 9 | 15 | 15 | 6 | 6 | 6 | 9 | 3 | 9 | 12 | 3 | 15 | 225 | 2% | |
Incapacitation | 1 | 2 | 2 | 2 | 2 | 3 | 1 | 4 | 5 | 2 | 1 | 1 | 2 | 5 | 2 | 2 | 2 | 1 | 3 | 5 | 5 | 2 | 2 | 2 | 3 | 1 | 3 | 4 | 1 | 5 | 75 | 1% | |
Interference | 4 | 8 | 8 | 8 | 8 | 12 | 4 | 16 | 20 | 8 | 4 | 4 | 8 | 20 | 8 | 8 | 8 | 4 | 12 | 20 | 20 | 8 | 8 | 8 | 12 | 4 | 12 | 16 | 4 | 20 | 300 | 3% | |
Malicious Logic-Corruption | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
Malicious Logic- Disabling | 3 | 6 | 6 | 6 | 6 | 9 | 3 | 12 | 15 | 6 | 3 | 3 | 6 | 15 | 6 | 6 | 6 | 3 | 9 | 15 | 15 | 6 | 6 | 6 | 9 | 3 | 9 | 12 | 3 | 15 | 225 | 2% | |
Natural Catastrophe | 1 | 2 | 2 | 2 | 2 | 3 | 1 | 4 | 5 | 2 | 1 | 1 | 2 | 5 | 2 | 2 | 2 | 1 | 3 | 5 | 5 | 2 | 2 | 2 | 3 | 1 | 3 | 4 | 1 | 5 | 75 | 1% | |
Overload | 4 | 8 | 8 | 8 | 8 | 12 | 4 | 16 | 20 | 8 | 4 | 4 | 8 | 20 | 8 | 8 | 8 | 4 | 12 | 20 | 20 | 8 | 8 | 8 | 12 | 4 | 12 | 16 | 4 | 20 | 300 | 3% | |
Physical Destruction | 1 | 2 | 2 | 2 | 2 | 3 | 1 | 4 | 5 | 2 | 1 | 1 | 2 | 5 | 2 | 2 | 2 | 1 | 3 | 5 | 5 | 2 | 2 | 2 | 3 | 1 | 3 | 4 | 1 | 5 | 75 | 1% | |
Tampering | 5 | 10 | 10 | 10 | 10 | 15 | 5 | 20 | 25 | 10 | 5 | 5 | 10 | 25 | 10 | 10 | 10 | 5 | 15 | 25 | 25 | 10 | 10 | 10 | 15 | 5 | 15 | 20 | 5 | 25 | 375 | 4% | |
Usurpation | |||||||||||||||||||||||||||||||||
Malicious Logic-Misuse | 5 | 10 | 10 | 10 | 10 | 15 | 5 | 20 | 25 | 10 | 5 | 5 | 10 | 25 | 10 | 10 | 10 | 5 | 15 | 25 | 25 | 10 | 10 | 10 | 15 | 5 | 15 | 20 | 5 | 25 | 375 | 4% | |
Misappropriation | 5 | 10 | 10 | 10 | 10 | 15 | 5 | 20 | 25 | 10 | 5 | 5 | 10 | 25 | 10 | 10 | 10 | 5 | 15 | 25 | 25 | 10 | 10 | 10 | 15 | 5 | 15 | 20 | 5 | 25 | 375 | 4% | |
Misuse | 5 | 10 | 10 | 10 | 10 | 15 | 5 | 20 | 25 | 10 | 5 | 5 | 10 | 25 | 10 | 10 | 10 | 5 | 15 | 25 | 25 | 10 | 10 | 10 | 15 | 5 | 15 | 20 | 5 | 25 | 375 | 4% | |
Tampering-Misuse | 5 | 10 | 10 | 10 | 10 | 15 | 5 | 20 | 25 | 10 | 5 | 5 | 10 | 25 | 10 | 10 | 10 | 5 | 15 | 25 | 25 | 10 | 10 | 10 | 15 | 5 | 15 | 20 | 5 | 25 | 375 | 4% | |
Theft of Data | 4 | 8 | 8 | 8 | 8 | 12 | 4 | 16 | 20 | 8 | 4 | 4 | 8 | 20 | 8 | 8 | 8 | 4 | 12 | 20 | 20 | 8 | 8 | 8 | 12 | 4 | 12 | 16 | 4 | 20 | 300 | 3% | |
Theft of Service | 4 | 8 | 8 | 8 | 8 | 12 | 4 | 16 | 20 | 8 | 4 | 4 | 8 | 20 | 8 | 8 | 8 | 4 | 12 | 20 | 20 | 8 | 8 | 8 | 12 | 4 | 12 | 16 | 4 | 20 | 300 | 3% | |
Violation of Permissions | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
Disclosure | |||||||||||||||||||||||||||||||||
Cryptanalysis | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
Eavesdropping | 5 | 10 | 10 | 10 | 10 | 15 | 5 | 20 | 25 | 10 | 5 | 5 | 10 | 25 | 10 | 10 | 10 | 5 | 15 | 25 | 25 | 10 | 10 | 10 | 15 | 5 | 15 | 20 | 5 | 25 | 375 | 4% | |
Exposure | 3 | 6 | 6 | 6 | 6 | 9 | 3 | 12 | 15 | 6 | 3 | 3 | 6 | 15 | 6 | 6 | 6 | 3 | 9 | 15 | 15 | 6 | 6 | 6 | 9 | 3 | 9 | 12 | 3 | 15 | 225 | 2% | |
Hardware or Software Error-System Failure | 1 | 2 | 2 | 2 | 2 | 3 | 1 | 4 | 5 | 2 | 1 | 1 | 2 | 5 | 2 | 2 | 2 | 1 | 3 | 5 | 5 | 2 | 2 | 2 | 3 | 1 | 3 | 4 | 1 | 5 | 75 | 1% | |
Human Error-Unintentional | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
Inference | 5 | 10 | 10 | 10 | 10 | 15 | 5 | 20 | 25 | 10 | 5 | 5 | 10 | 25 | 10 | 10 | 10 | 5 | 15 | 25 | 25 | 10 | 10 | 10 | 15 | 5 | 15 | 20 | 5 | 25 | 375 | 4% | |
Interception | 5 | 10 | 10 | 10 | 10 | 15 | 5 | 20 | 25 | 10 | 5 | 5 | 10 | 25 | 10 | 10 | 10 | 5 | 15 | 25 | 25 | 10 | 10 | 10 | 15 | 5 | 15 | 20 | 5 | 25 | 375 | 4% | |
Intrusion | 5 | 10 | 10 | 10 | 10 | 15 | 5 | 20 | 25 | 10 | 5 | 5 | 10 | 25 | 10 | 10 | 10 | 5 | 15 | 25 | 25 | 10 | 10 | 10 | 15 | 5 | 15 | 20 | 5 | 25 | 375 | 4% | |
Penetration | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
Reverse Engineering | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
Scavenging | 2 | 4 | 4 | 4 | 4 | 6 | 2 | 8 | 10 | 4 | 2 | 2 | 4 | 10 | 4 | 4 | 4 | 2 | 6 | 10 | 10 | 4 | 4 | 4 | 6 | 2 | 6 | 8 | 2 | 10 | 150 | 2% | |
Theft | 1 | 2 | 2 | 2 | 2 | 3 | 1 | 4 | 5 | 2 | 1 | 1 | 2 | 5 | 2 | 2 | 2 | 1 | 3 | 5 | 5 | 2 | 2 | 2 | 3 | 1 | 3 | 4 | 1 | 5 | 75 | 1% | |
Traffic Analysis | 3 | 6 | 6 | 6 | 6 | 9 | 3 | 12 | 15 | 6 | 3 | 3 | 6 | 15 | 6 | 6 | 6 | 3 | 9 | 15 | 15 | 6 | 6 | 6 | 9 | 3 | 9 | 12 | 3 | 15 | 225 | 2% | |
Trespass | 3 | 6 | 6 | 6 | 6 | 9 | 3 | 12 | 15 | 6 | 3 | 3 | 6 | 15 | 6 | 6 | 6 | 3 | 9 | 15 | 15 | 6 | 6 | 6 | 9 | 3 | 9 | 12 | 3 | 15 | 225 | 2% | |
Wiretapping | 4 | 8 | 8 | 8 | 8 | 12 | 4 | 16 | 20 | 8 | 4 | 4 | 8 | 20 | 8 | 8 | 8 | 4 | 12 | 20 | 20 | 8 | 8 | 8 | 12 | 4 | 12 | 16 | 4 | 20 | 300 | 3% | |
Risk Total for Vulnerability | 252 | 252 | 252 | 252 | 378 | 126 | 504 | 630 | 252 | 126 | 126 | 252 | 630 | 252 | 252 | 252 | 126 | 378 | 630 | 630 | 252 | 252 | 252 | 378 | 126 | 378 | 504 | 126 | 0 | 630 | 9450 | 100% | |
Percent of Total Risk | 3% | 3% | 3% | 3% | 4% | 1% | 5% | 7% | 3% | 1% | 1% | 3% | 7% | 3% | 3% | 3% | 1% | 4% | 7% | 7% | 3% | 3% | 3% | 4% | 1% | 4% | 5% | 1% | 7% | 9450 | 100% | ||
RISK RATING | VERY HIGH | LOWEST RANK OF VULNERABILITIES AND THREATS TO FLAG: | 9 | ||||||||||||||||||||||||||||||
VULNERABILITY | 378 | 4% | |||||||||||||||||||||||||||||||
THREAT | 375 | 4% | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | |||||||||||||||||||||
MAXIMUM | 25 | ||||||||||||||||||||||||||||||||
RISK TOTALS | 18900 | ||||||||||||||||||||||||||||||||
TOTAL RISKS | 1015 | ||||||||||||||||||||||||||||||||
LOW | 1015 | ||||||||||||||||||||||||||||||||
MEDIUM | 4060 | ||||||||||||||||||||||||||||||||
HIGH | 9135 | ||||||||||||||||||||||||||||||||
VERY HIGH | 16240 | ||||||||||||||||||||||||||||||||
&"Courier,Regular"&14SENSITIVE – FOR OFFICIAL USE ONLY&"Arial,Bold"&E &F
Page &P of &N &"Courier,Regular"&12SENSITIVE // FOR OFFICIAL USE ONLY &D
Risk Computation Exploited
Vulnerabilities | Inadequate Security Policy | Inadequate Training | Inadequate System Administration | Inadequate User Account Management | Inadequate Personnel Management | Incomplete Contingency Plan | Disclosure of Data | Modification of Data | Unlimited Access to Data | Objects Not Cleared Before Reuse | Inadequate Warning Banners | Use of Replayable I&A | Password Vulnerability to Cracking | Sharing of ID or Passwords | Session Timeout on Server | Concurrent Logon Sessions Permitted | Inadequate Audit Log | Inadequate Audit Analysis | Data Transmissions in the Clear | Susceptibility to Line Tapping | Inconsistent Physical Perimeter | Inadequate CM – Development | Inadequate CM – Operations | Facility Unavailability | Data Unavailability | System / Component Unavailability | Unstable / Insufficient Communication | Inadequate / Missing Documents | Failure to Achieve and Maintain Accreditation | Inadequate Protection of Web Server | |||
Threats | Wts. | 2 | 2 | 2 | 2 | 3 | 1 | 4 | 5 | 2 | 1 | 1 | 2 | 5 | 2 | 2 | 2 | 1 | 3 | 5 | 5 | 2 | 2 | 2 | 3 | 1 | 3 | 4 | 1 | N/A | 5 | Risk Total for Threat | Percent of Total Risk |
Deception | |||||||||||||||||||||||||||||||||
False Denial of Origin | 2 | 4 | 4 | 8 | 0% | ||||||||||||||||||||||||||||
False Denial of Receipt | 2 | 4 | 4 | 8 | 0% | ||||||||||||||||||||||||||||
Falsification | 4 | 8 | 20 | 4 | 32 | 2% | |||||||||||||||||||||||||||
Insertion | 3 | 6 | 15 | 3 | 24 | 1% | |||||||||||||||||||||||||||
Malicious Logic-Masquerade | 3 | 6 | 6 | 6 | 6 | 6 | 3 | 15 | 48 | 2% | |||||||||||||||||||||||
Masquerade | 2 | 4 | 6 | 4 | 14 | 1% | |||||||||||||||||||||||||||
Repudiation | 2 | 4 | 4 | 8 | 0% | ||||||||||||||||||||||||||||
Substitution | 4 | 8 | 8 | 20 | 4 | 40 | 2% | ||||||||||||||||||||||||||
Disruption |