Question:
Produce a risk assessment of the scenario given using the steps outlined. Ensure you cover all the steps in the risk assessment process and ensure you use the risk assessment tools.
Steps Used in Risk Assessments
Identify assets and activities to address
Identify and evaluate relevant threats
Identify and evaluate relevant vulnerabilities
Identify and evaluate countermeasures
Assess threats, vulnerabilities, and exploits
Evaluate risks
Develop and present recommendations
RISK ASSESSMENT
Scenario:
A research organization wants to set up a secure collaboration portal site for their partners and customers. In the existing structure each external DMZ application has its own authentication system, and user administrators with no connection to other applications. The collaboration portal site provides an identity service and a common entry portal for collaboration. The system would trust users across organizations into specific applications they were authorized to view.
The system should (see Case Study 3 Diagram and Business Model Canvas attachments):
• connect their existing DMZ prototype applications to their customers through this entry point
• centralize the user identity management and user experience with the organization
• provide a secure way for partners and customers to have a single sign on experience
• identify users with different levels of trust depending on credentials provided.
• create visibility into the social interactions for better resource management
Produce a risk assessment of the scenario above using the steps outlined on Slide 18 of Lecture 6. Ensure you cover all the steps in the risk assessment process and ensure you use the risk assessment tools discussed in our lectures.
The papers are to be 4 to 6 pages in length and will reflect research conducted by the student and an analysis that is in the students own words. All references to other work must be properly cited (the use of un-cited work that is not by the student is an academic violation). The papers are to be submitted as attachments in the "Assignment Dropbox" area of the class Blackboard site under the appropriate case study assignment. The paper should be submitted electronically as a Microsoft Word document using APA format. Citation references should be listed as footnotes.
The paper should have the following structure:
1. Abstract
2. Key Terms
3. Introduction
4. Analysis
5. Conclusion
6. References
Attachment:- case study 33.pdf