Assignment title: Information


Exercise 1: ABC distributing is a wholesaler specializing in the distribution of canned fruits and vegetables. To facilitate their supply-chain management, they developed and implemented a web site that allows customers and vendors to directly interact with ABC ordering system. The website is hosted in a single computer in the ABC Distributing warehouse located in Miami, Florida. When a customer or a vendor changes information in the ordering system, those changes are immediately made permanently in the main ABC ordering database system.Analyze this scenario and answer the following questions: a) Based on the scenario, what are the main information assets held by ABC Distributing? b) Place the assets you identified in a) in a prioritized order, according to your evaluation of the scenario. Be sure to provide a reasoned justification for your prioritization.Exercise 2: If an organization has three information assets to evaluate for risk management, as shown in the accompanying data, which vulnerability should be evaluated for additional controls first? Which one should be evaluated last?Data for Exercise 2:• Switch L47 connects a network to the Internet. It has two vulnerabilities: it is susceptible to hardware failure at a likelihood of 0.2, and it is subject to an SNMP buffer overflow attack at a likelihood of 0.1. This switch has an impact rating of 90 and has no current controls in place. You are 75 percent certain of the assumptions and data.• Server WebSrv6 hosts a company Web site and performs e-commerce transactions. It has a Web server version that can be attacked by sending it invalid Unicode values. The likelihood of that attack is estimated at 0.1. The server has been assigned an impact value of 100, and a control has been implanted that reduces the impact of the vulnerability by 75 percent. You are 80 percent certain of the assumptions and data.• Operators use an MGMT45 control console to monitor operations in the server room. It has no passwords and is susceptible to unlogged misuse by the operators. Estimates show the likelihood of misuse is 0.1. There are no controls in place on this asset; it has an impact rating of 5. You are 90 percent certain of the assumptions and data.Exercise 3: Identify one information asset that is valuable to your organization. a) Explain why you feel it to be valuable.b) In terms of low, medium and high impact, assess the impact that a breach of its security requirements could have on your organization. What do you think is the likelihood of a breach?Exercise 4: As a part of a formal risk assessment of the main file server for a small legal firm, you have identified the asset "integrity of the accounting records on the server" and the threat "financial fraud by an employee, disguised by altering the accounting records. Suggest reasonable values for "likelihood", "consequence" and "level of risk" for this asset and threat and provide some justifications for your choices. What type of controls would you recommend?