CO4512 - Information Security Management - University of Central Lancashire
Learning Outcomes
This assignment addresses the following learning outcomes from the module syllabus:
Learning Outcome 1 - Select and use applicable standards and methods for information security and risk management.
Learning Outcome 3 - Conduct and properly document risk assessment based on a given scenario.
Learning Outcome 4 - Find and evaluate appropriate published information to remain up-to-date about threats, vulnerabilities and patches.
Assignment Description
This assignment requires you to plan, conduct and document a risk assessment based on the scenario described in Section 3.
Assignment task
In this assignment you have to:
Question 1. Conduct a risk assessment on the network in Figure 1, based on the ISO 27005 standard.
Question 2. Write a detailed risk assessment report.
Report Structure
To meet the requirements your report must have a professional look. In order to help you in this regard the following structure is provided as a guideline. The report must contain the following main sections, however, you are allowed to add subsections as you find reasonable.
Introduction
Here you will specify the risk assessment method that you use, discuss the advantages of this risk assessment method. Finally, highlight the certain tasks that you will perform during the risk assessment on the given system.
Risk Assessment
This section contains the main part (result) of the report, namely, the whole risk assessment process made on the system in Figure 1, besides your chosen system parameters. The section can include several sub-sections:
• Owner specification,
• Assets (primary and secondary). You should explain briefly why the assets are primary or secondary. You can give a collective explanation for a group of assets instead of explaining for each asset.
• One threat for each asset.
• One vulnerability for each asset. The vulnerabilities have to be taken from one of the online vulnerability database (e.g. NVD), and have to be given with the official CVE number.
• Likelihood level computation, using Boston gird
• Impact table specification
• Risk identification with the risk level, using risk matrix (Boston grid).
o At most 10 risks should be given.
Summary and Recommendations
Summarize the main findings and write a non-technical recommendation (executive summary) for the management/director board, summarizing why they should invest in security and follow the ISO 27001 standards.
Attachment:- Information Security Management.rar