0%

Cyber Security: Risk Management Report

Identify the potential risk or threat on computer\iPad\Phone, decide how the impact and likely of threat, deal the threat with the mitigation, using the risk chart to record the steps.

Item 1 name: ThinkPad laptop 2017

Description: This is a laptop with a lot of important files on it.
Threat 1: Virus Attacks that can damage computer systems and data.
Mitigation: Install the anti-virus software, such as McAfee.

Item 2 name: laptop hard drive

Description: Hard drive is the most important part in laptop. With the damage hard drive, the laptop can’t even start.
Threat 2: HDD has unrecoverable failure and lost all data on laptop
Mitigation: Make extra copy on other computer or buy extra HDD for storing important files.

Item 3 name: host station

Description: It should be a firewall between the internal and external net in order to keep the host station safe.
Threat 3: Internet Hacks
Mitigation: Placed a firewall between trusted network and the untrusted network.

Item 4 name: iPhone

Description: having a lot of important information on it, such as credit card, PayPal account, BOA bank account, it will be the target of malicious program by the third party.
Threat 4: The malicious third-party thief the information.
Mitigation: Keep the operating system and application update all the time and use encryption.

Item 5 name: iPad

Description: iPad uses Wi-Fi to connect to internet and is easy to be hacked.
Threat 5: Wireless hacker.
Mitigation: take penetration test.