Question: PLEASE USE TARA RISK MANAGEMENT FRAMEWORK Question Information security risks assessment is a process in which the knowledge of internal and external information vulnerabilities pertinent

PLEASE USE TARA RISK MANAGEMENT FRAMEWORK
Question Information security risks assessment is a process in which the knowledge of internal and external information vulnerabilities pertinent to a particular organization is matched against real-world cyber-attacks. Concerning cybersecurity, this threat-oriented approach to combating cyber-attacks represents a smooth transition from a state of reactive security to a proactive one. Moreover, the desired result of a threat assessment is to give best practices on how to maximize the protective instruments for availability, confidentiality, and integrity (CIA), without turning back to usability and functionality conditions. The following are four hypothetical Information Systems (IS) being developed in Africa. Working in groups of four or five, each group should prepare an Information security risk assessment for one of the Information systems, using the risk management framework (OCTAVE, FAIR, NIST RMF or TARA) assigned to the group in week 2. Pay particular attention to the known attack lifecyde and processes for stopping attacks at the various stages of an attack to prescribe control mechanisms. Note that these information systems may pull data from several existing databases and may send information to several other computing systems over the internet. Each group should submit its final document on Moodle by 15 February 2021. Computing System 1 AJSheryl is a cyber-physical automobile manufacturing plant using the system, using a set of interacting systems. Highly skilled workers are provided with operational insights directly from coordinated intelligent machines controlled by a central entity. Every functional aspect of production from design, to manufacturing and supply chains, extending to customer service and support are interacting. This smart factory is hyper-connected and data-intensive, and rely on an industrial-grade 5G network that is 100 percent secure from Ericsson. The 5G- enabled Digital Twin-, which Ericsson is trailing, with Comau is an excellent example of the ability of cyber-physical systems to create and combine the physical or digital aspects of products, systems, and processes. Here, physical machines in the automotive plant are fitted with massive sensors that send status data to a virtual reproduction constantly. Question Information security risks assessment is a process in which the knowledge of internal and external information vulnerabilities pertinent to a particular organization is matched against real-world cyber-attacks. Concerning cybersecurity, this threat-oriented approach to combating cyber-attacks represents a smooth transition from a state of reactive security to a proactive one. Moreover, the desired result of a threat assessment is to give best practices on how to maximize the protective instruments for availability, confidentiality, and integrity (CIA), without turning back to usability and functionality conditions. The following are four hypothetical Information Systems (IS) being developed in Africa. Working in groups of four or five, each group should prepare an Information security risk assessment for one of the Information systems, using the risk management framework (OCTAVE, FAIR, NIST RMF or TARA) assigned to the group in week 2. Pay particular attention to the known attack lifecyde and processes for stopping attacks at the various stages of an attack to prescribe control mechanisms. Note that these information systems may pull data from several existing databases and may send information to several other computing systems over the internet. Each group should submit its final document on Moodle by 15 February 2021. Computing System 1 AJSheryl is a cyber-physical automobile manufacturing plant using the system, using a set of interacting systems. Highly skilled workers are provided with operational insights directly from coordinated intelligent machines controlled by a central entity. Every functional aspect of production from design, to manufacturing and supply chains, extending to customer service and support are interacting. This smart factory is hyper-connected and data-intensive, and rely on an industrial-grade 5G network that is 100 percent secure from Ericsson. The 5G- enabled Digital Twin-, which Ericsson is trailing, with Comau is an excellent example of the ability of cyber-physical systems to create and combine the physical or digital aspects of products, systems, and processes. Here, physical machines in the automotive plant are fitted with massive sensors that send status data to a virtual reproduction constantly
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
