Question

Threat modelling report in response to a case scenario by identifying the
threat types and key factors involved.write a report to identify the threat types
and key factors involved. In doing so, required to identify the most ‘at-risk’ components, create
awareness among the staff of such high-risk components and how to manage them. In addition, this report is to
help key stakeholders, including the executive managers, to make decisions on what course of actions must be
undertaken to mitigate potential threats.

Draw a use DFDs (Data Flow Diagrams):
• Include processes, data stores, data flows
• Include trust boundaries (Add trust boundaries that intersect data flows)
• Iterate over processes, data stores, and see where they need to be broken down
• Enumerate assumptions, dependencies
• Number everything (if manual)

-

Determine the threat types that might impact your system
• STRIDE/Element: Identifying threats to the system.
• Understanding the threats (threat, property, definition)

Case Scenario The Business & Communication Insurance (B&C Insurance) began business as a private health insurer, established

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution:

Given information:
A Company name B&C Insurance established in 1965 headquatered in NY, having global locations in other countries.
A ransom email had been recieved on the company's email claiming to expose the strategic plans and data of 200,000 clients.
Sample of 200 clients data is included in the email.

Output required.
A report that covers the "Threat Analysis" and "Actions to manage the risks".
Data flow diagrams covering processes, data stores and data flows[Attached Image]
Trust boundaries that intersect data flows.
Drill deep into processes and practices
Enumerate assumptions, dependencies.

Answer is prepared in following way.[Chronological investigation] [Keypoints and findings are included in between to understand the flow of information.]
1. Investigate and collect data about the threat.
2. Company's current security practices.
3. Analyse the data collected from above 2 points.
4. Sharing the results after analysis and suggesting course of action.

1. Investigate and collect data about the threat.
Mail threat recieved [Verify the threat: Validated]
Claimed to have 2 sets of information.[1. Strategic plans] and [2. Personal data of 200,000 clients]
[Personal data of 200,000 clients is also available for sale on some hacker site.]
[Attached data of 200 customers are genuine]

Key Point#1
[Considering a case where to support the claim, discssion is initiated on the hacker site.]

key Point#2
[Personal details of employees may be available on some professional inter-company portals and with some extra work, possible to find the data.]

Ransom email recieved.[Identify the source]
Source of email is generally some unreliable network from where it is difficult to trace out the data.

Key Point#3
[Identifying the origin of email will help in investigation[Priority#2]. However, providing more protection from now on-wards is more important[Priority#1]]

[Findings]
[Identify the system from which data has been stolen]
[Is data still accessible]
[What are others threats to the company]
[Need to verify whether strategic data is really leaked or not]

2. Company's current security practices.

Key Point#4
[Personal details and strategic plans are very critical information to any company, compromisation of details means attacker may have other access.]

ASSUMPTIONS{As these details are not given, general assumptions are as below]
1. Critical information is stored at headquarter office only.
2. Personal details are stored respectively at each office and at central office.
3. Company's internally developed system maintains all daily communications, mails and file exchanges.
4. Email systems can be handled via app via mobile.
5. Company's emails and documents are not allowed to sent on outside network/email.
6. No mails are allowed from outside network expect some senior employees.
7. All employees stick to above rules as security policies.

3. Analyse the data collected from above 2 points.
[Need to ensure total protection using multi-layer security practices.]

Based on below checklist, data is analyzed.
1.Physical Security:
a) Only authorized perons are allowed inside the campus.
b) Access levels are different for employees according to nature of their jobs.
c) Server room access are restricted.

2. Network Security
a). All routers, gateways and switches have updated drivers and softwares.
b). Passwords are changed regularly.
c). Firewalls is active and working.
d). All devices should be checked reguarly for any abnormal behavior.

3. Personal system security
a). Anti-virus is updated.
b). Operating system is updated.
c). All softwares are updated.

4. Regular security audits.
a). Analyze the network data for any suspicious activity.
b). Ensure above practices are followed reguarly.

New practices that should be added
1.(b), 2(b), 3(c) and 4.


4. Sharing the results after analysis and suggesting course of action.
Below are action items to be followed by all employees till further communication.
1. From the checklist strictly follow 1.(b), 2(b), 3(c) and 4.
2. DO NOT Use mobile for any company communication. If using, do not use any other app or any communication with that device.
3. Do not share any company data on any network or on personal networks.
4. Do not open mails other than company's internal network.

Data flow Digram #1 Trust boundaries Server Systema 4 Systemol systemst Systema { System 6 system3 Attemps Attenopts AHacker

Add a comment
Know the answer?
Add Answer to:
Threat modelling report in response to a case scenario by identifying the threat types and key...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program...

    DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program - Email Surveillance Audit Program – What is the structure and contents including various audit steps. Find 1-2 steps in the audit program where the audit software can be used. How can audit software be used to gather evidence?. (the Audit program (Email Surveillance Audit Program details is attached). DQ3. Review the contents of the Audit Manual of Office of University Audits at University...

  • Starbucks Corporation Case Studies – Accounting for Business Decisions Review the 2016-2018 10-Ks (Annual Report of...

    Starbucks Corporation Case Studies – Accounting for Business Decisions Review the 2016-2018 10-Ks (Annual Report of 2018 - available in google search), Part 1, Items 1, 1A, 2, 3, and Part II, Items 7 and 8. Part I contains a discussion on the business model, risk factors, properties, and legal issues. Part II contains Management’s Discussion and Analyses, the financial statements and the notes to the financial statements. All these statements are referred to as management assertions. Parts I and...

  • CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key...

    CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key role in the U.S. health care delivery system. These providers integrate internal and external information with their clinical knowledge to determine the patient’s treatment options. An effective ambulatory electronic health record (EHR) is critical to supply physicians with the information they need to provide quality care and maximize their efficiency. This case involves the decision-making process to replace an inadequate EHR system in a...

  • Case Studies: include the case study in your response... you may cut and paste it. Case...

    Case Studies: include the case study in your response... you may cut and paste it. Case studies/NCPs are NOT a group assignment. Each student completed individually demonstrating knowledge gained and critical thinking skills. Re-read the instructions in the Medical Surgical case studies if you do not remember the correct way to complete case studies and NCPs. email to [email protected] Please allow 7 business days for an email response to your submitted work as they are read and commented upon. Essentials...

  • What an Executive Summary Is An executive summary is a specific type of document that does...

    What an Executive Summary Is An executive summary is a specific type of document that does two things: it summarizes a research article, and it offers recommendations as to how information from the article can be used. Some long reports can contain an executive summary section, as indicated in the Pearson handbook. Write a 2 pahe Executive Summary In business contexts, an executive summary is always written for a specific purpose: to explain the information in the article to a...

  • Select two of the discussion questions and analyze the case study using project management principles. Apply...

    Select two of the discussion questions and analyze the case study using project management principles. Apply your knowledge of project management to the facts presented in the case study to describe how you would proceed. We only need to answer one of the questions. A thorough answer will probably require 300 to 500 words for each question.   Feel free to use text bullets, tables, or graphics to summarize your points. Questions Q1: Make or Buy decision – Describe the make...

  • The activity An EHR was implemented at the General Hospital one year ago, before you were...

    The activity An EHR was implemented at the General Hospital one year ago, before you were hired. The implementation process did not go smoothly and now there are strong EHR advocates and strong EHR-dissenters on the team. The CEO wants to move forward with an implementation of the bar-coded medication administration feature of the EHR, but the director of nursing does not. You have been asked to manage the implementation and see that it is successful. You will first need...

  • 2. Case Discussion for INTERNET MARKETING Digital Transformation at Disney World The Disney theme park experience...

    2. Case Discussion for INTERNET MARKETING Digital Transformation at Disney World The Disney theme park experience – whether it is at the Magic Kingdom in Walt Disney World in Orlando, FL or the original Disneyland in Anaheim, CA or one of the newer parks, such as the Shanghai Disney Resort (opening in 2016) – is designed to be an immersive, exciting, and definitely magical experience for guests. Disney famously wants the reality created inside its theme parks to be better...

  • 1. find an article about a product or service that impacts your daily life and write...

    1. find an article about a product or service that impacts your daily life and write 1 to 2 paragraphs describing the item, how it impacts your life, and what factors you think are impacting the supply and demand of this item. Be sure to include the URL of the article you accessed for this question. 2.What are the ethics of outsourcing? Is a corporation’s primary responsibility to its stockholders, by reducing labor costs? Or is its primary responsibility to...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT