An Overview Of CommDev

CommDev’s Vision and Mission

Information security of a given company should always be treated in a very serious way. The security of such information if not handled well may lead to leakage or data being comprised leading to the organisation losing its data confidentiality. It is very hard for a company to secure their information and feel that they are fully satisfied with the method they have applied in securing their information. It is mandatory for any company to set some risk management strategies with regards to how such vulnerabilities and insecurity issues can be handled in cases where they occur. It is common nowadays to hear or even see incidences where a specific organisation security has been breached or comprised. In consideration to CommDev case study, for instance a computer or a laptop at CommDev is lost or even stolen or a situation where their data center which has servers is accessed without their authentication and authorization.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

CommDev is an organisation which aims at supporting the needy children in the Pacific and Asian regions and particularly in Australia where its headquarters are based. CommDev is an organisation that is there to not to make profits but its main mission to doing charitable works like helping the children to achieve their dreams in all aspects of what they do in schools regardless of the ethnicity and race. The incidents may be net worth considering that the confidentiality of data will be lost. A CommDev just like the modern society and companies has entirely depended on the third party storage, transmission of data and the consumption of information. Information at any organisation is always considered to be an asset which is valuable and is supposed to be protected always at all times regardless of what entails.

Information security is known for comprising of a CIA triangle.  The word CIA means Confidentiality, Integrity and Availability of information respectively (adrofee, 2016). Sometimes accountability is considered as an aspect too which plays a major role in protecting the information.

Confidentiality is known as the protection of CommDev information against cases of theft and eavesdropping. Integrity on the other hand with concept to CommDev is the protection of their information to anybody who is not authorized to modify and masquerade. Availability is simply the dependable user’s access to the information that is authorized and in particular in the light of attacks such as DOS attacks against the information system. Lastly is the concept of accountability which is assigning all the responsibilities and traceable actions to all the parties involved.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

CommDev’s Key Operations and Presence

CommDev is an institution which has resources which are limited and when it comes to dedicating such to the information security then it might be a challenge to the management. There must be a balance between the limited resources against the information value the possible threats which are against and associated with (Blakley, 2012). Information security is known to be entirely a problem for risk management. It will be unreasonable for any individual to believe and think that all the valuable information can always be kept safe against all the predicted and unpredicted attacks.  Any attacker or a person with unlimited determination and all the resources in performing an attack can do harm to the organisation information. In considering a situation where there are defenses, there will be point where there will be existence of probability for an optimization to be successful. There are many situations where many organisations such as CommDev find themselves eliminating risks while in real sense a more practical approaches would have been better as it will strategically craft all the defenses in security by mitigating or minimizing all the risks to all levels which are acceptable.  For CommDev to accomplish the discussed goal, it will be necessary for them to perform a methodical analysis of the risks. This chapter has entailed the overview of the risk management process.

Risk management in an organization like CommDev may be so tricky and very wide.  In this concept risk management may be categorized in to three processes as shown in te diagram below figure below.

 

Figure 1 risk management steps

As a researcher and a viewer of such management processes of risk in information security it will be good for one to note there are no universal agreement which are made on the above three processes, but in most cases the views will share the risk common elements which are to be assessed and mitigated (Reinhard, 2011).  Risk assessment is done and considered as the first step where a risk must be assessed for one to confirm it for sure the risk can be a threat to the information. After the risk has been assessed then if it may pose some threats to the organisation then it will be wise to mitigate such risks and provide an effective evaluation.  Risk assessment is usually performed to help one understand the processing and system storage of the information which is valuable, vulnerabilities of the system, some of the possible threats, impacts which are likely posed by such threats and much more the risks which will emerge posing a threat to the entire system.

CommDev’s Significant Fund Turnover

Risk assessment is considered to be very simple and sometimes considered as an academic exercise without inclusion of the mitigation of the risk process (navathe, 2012).  The concept risk mitigation means that a strategic plan that is used in prioritizing all the identified risks under any constraints of the limited resources of organization.  The third and last process is that of effective assessment which has a goal of measuring and verifying the objectives of the risk mitigated if they have been met accordingly and according to the to the organisation needs and requirements with reference to information they need to be secured.  If there is not clear then the other two steps first and second that is risk assessment and mitigation must be updated accordingly for the effects to reflect.  Essentially, effectiveness assessment is meant for giving feedback to the first and second processes and much more in ensuring correctness.  The environment surrounding CommDev environment as explained in the case study can be termed to be not static. CommDev environment not being static has led them to have the need of having continuous process of evaluation and updating the risk mitigated strategies with information which may be said to new to the organisation.

It is not possible for an individual or an organisation to know when they will be attacked. Risks is really explained on the basis on what is expected or might happen (jaquith, 2013). However, threat may not be considered much of a risk in situations where the system that is protected is in any way not vulnerable to the specific threats or the potential loss making it not to be significant.  Risk is known to be vulnerabilities functions and the impacts which are expected from the threats available or posed. Risk assessment at CommDev may involve several steps in knowing and understanding the assets value, vulnerabilities of the system, threats which are possible, likelihoods of such threats and the impacts which are expected in case such attacks are successful. The figure below is used to show the steps that CommDev can use in assessing the risk in the organisation.

Figure 2 Steps involved in assessment of risks

CommDev is known in many ways. It runs a corporate systems which is called MicroForce and which is used the maintaining the records of vendors. For the past few years MicroForce has experienced high numbers of vendors who have been providing free services or services which are lower on the basis of what CommDev does. The increment of such project initiated may sometimes need to be postponed because the corporate system unable to cope with all the projected demands and thus trying to mitigate information security in that way though they end up losing so many customers and people who might be willing to help them (Loeb, 2012).

Prominent CDA: Child Education and Sponsorship

Another area where CommDev has tried is that there exists a data backup and infrastructure where there is a data center set in a remote place to cater for all the information coming in and out of the organisation. Data center may have been a way that needed to be done as the staff were affected by the attacks from malicious codes which used to affect their applications and systems as a whole without forgetting on the crucial information of the organisation. Confidentiality, integrity and availability of the data is the most important thing when it comes to securing the information of a given organisation. In assessing such risks before a data center is set for CommDev then it will be good to consider the five steps so that the following risks can be mitigated if they have been assessed.

For any organization doing a risk assessment it will be necessary to do an identification of the information that is to be protected, the value it has to CommDev and some of the system elements such as the (software, hardware, people using such devices, the networks through which data is transmitted and the processes) that are used in supporting the storage, to process and transmit such information. Understanding the above will be termed as the concept of information technology (IT). In making it simple it will be wise to say that the entire information technology environment is said to be featured with terminologies such as the equipment’s, assets and their value, the information flow and the responsibilities and duties of each personnel (Kilner, 2010).

In most cases characterization of the system is done where one combines the method of data gathering and collections such as one-on-one interviews which may be structured or semi-structured or unstructured, use of questionnaires which may have open or close-ended questions, documentation reviews, doing on-site inspections and the use of automated scanning. In CommDev the on-site inspection and one-on-one interviews with personnel will work well as method of gathering information. There are several tools which may be free while others are commercial such as the scanning tools which may be available from the vendors who are controlled by MicroForce such as the Cheops, Net-Scan-Tools, NMap, INETTools, Strobe tools, WINSCAN and Sam-spade.

It may not be possible for one in devising a strategy without having to understand what one is defending against. Threat is referred to as something potential which may cause damages or troubles to the environment information technology. It will be useful for one in identifying all the possible causes of threats origins or sources. However, malicious attacks like the malicious code that affected the staff at CommDev may be caused by human sources which may from the human minds first thought the threat originality or source is not entirely on the human. There are several sources which may cause a threat such as those which are natural. A good example is when there is bad weather, situations when there is flood due to heavy rains, earthquakes such as tsunami, tornadoes, natural calamities such as avalanches and landslides. Other sources of threats can be factored by the environment failures such as power issues (Kurtz, 2016).

SCPP: A Unique and Sustainable Programme

In many cases, human threats are the most worrying as the malicious attack is always driven by intelligence and strategies set. It is not in all cases that the all threats caused by humans have a malicious intention. A good example where such human threats may not have a malicious intention is when a threat in CommDev emerges due to negligence for instance (when one forget the default account of the computer) or accidentally (misconfiguring the firewall in a manner that it will allow traffic which is unwanted) or lastly downloading software which is malicious without knowing that they will harm the computer information or entire system.

It may be hard to categorize the human attackers as the motivations and actions anticipated and involved may vary widely (Renaldo, 2017). When the motivations and actions which are anticipated by the human attacker are scrutinized in CommDev it will be wise to say that information technology human attackers can be classified in two divisions namely the internal and external attackers. In terms of the internal classification, this may be an employee who is disgruntled and may be seeking to revenge against CommDev or maybe a situation where there is a dishonest staff who is snooping all the information which are proprietary and in other cases information belonging to another employee.

The internal attacker may be so worrying in terms of the damages he or she can cause to the organization because this person has login credentials and rights and thus giving him or her a direct access to the organization assets which are valuable and perhaps interfering with the accounts of computers which are of high privileges. In contrast, the external human attacker must penetrate in the defenses of CommDev such as the firewalls in gaining access and then he or she would be likely to have a lot of difficulties to gain access to the assets which are valuable to the organization with accessing the roots and the privileges of admin.

External human attackers is known for the inclusion of amateur, hackers who are always motivated by their curiosity or much more ego, other criminals who are professional who looks to make profit, terrorist who aims at destroying and extortion, interests from military with a motivation of national interest and maybe hired industrial spies who will attempt to steal the information which is proprietary for the aim of making profit.   External threats in many cases might have the inclusion of malicious automated software’s such as the worms and viruses which may entangle and spread themselves via the internet. In many cases, this might be feasible when it comes to the identification of such major external threats. However, there always exists a possibility that a new unknown external threat will always arise.

CommDev’s Philosophy of Cooperation and Self-Reliance

Vulnerable analysis is referred to as how threats are supposed to be conceptualize in the context of vulnerability. Vulnerability can be defined as the weaknesses which may be exploited in future. A threat may not be important at all if the system is said to be not vulnerable to a given or a specific threat.. A good example of such, in CommDev A threat may take an advantage to the overflow of the buffer vulnerability which may be unique in Windows 95 which in other organization may not be imported without using any version of Windows 95 (Microsoft, 2014).

Technical Vulnerabilities are one of the easiest when it comes to identification of vulnerabilities. There are many vendors of computing and equipment’s used for networking which will always be used to publish the bug’s bulletin and the associated vulnerabilities along with the patches used for their products. There are some several websites which are known for maintaining security advisories list about all the vulnerabilities known. Some of this websites are such as the “https://www.securityfocus.com/archive/1” and “https://www.cert.org/advisories”. There are several free and commercial scanners which are used for scanning tools in assessing the operating system such as the SAINT, SARA, and Nessus among others. These commercial and free software scanners may contain databases of vulnerabilities which are known and usually do a system test by probing the possible vulnerabilities.  Another method that is applied in vulnerabilities discoveries in any system is the performance of a penetration testing which does some simulation on the attacker actions.  The conjecture is based on the attacks which are active known for helping to reveal the weaknesses of the system defenses.

It is not in all cases that vulnerability technical or well-defined. Vulnerability may always arise from security management. A good example is that the human resources at CommDev may be insufficient in covering up of all the important responsibilities in the security, or the personnel which has training which are insufficient.  The policies which are set for insecurity management may be unfinished, where the information system is exposed to probable optimizations. There are other examples which are related to the system operations, for instance, supposing the disposal of old Data CDs in to the trash which are accessed publicly. It may be easy for each individual to retrieve the data which was discarded.

The impact of the analyzed threats on CommDev organisation may depend on some of the uncertain factors, likelihood of a threat occurring, successful threats causing a loss and the frequency of threats recurring. Practically, the mentioned threats may be hard in estimating as there are various ways through which an individual can do an estimation and thus combining the impact analysis (NIST, 2013). The impact analysis can range from qualitative to quantitative methods. It would be ideal for one to estimate the probability which is exact with regards to each threat occurrence but in most cases, a rough approximate may be more credible and feasible. Likelihood of the occurrence of a threat will depend on the nature of the threat. In analyzing the human threats one has to consider the motivations of the attackers, their capabilities and the resources. Nevertheless, in most cases an estimation might be used in classifying the threats into three levels namely the unlikely, the moderately likely and those which are highly likely.

Coordination and Communication with CommDev Partners

For each and every threat, there is always a likelihood that it can be multiplied by the impacts in which it can be used in determining the risk levels. The risk is equaled to that likelihood and the impact. Risk= Likelihood*Impact. Some of the serious risks always possess both the likelihood and the impacts which are very high. When there is a very low likelihood with regards to the high impacts it may not be worth to be given any attention and likewise and vice versa while a threat that is highly-likely to occur but has an impact which is low may be termed as less serious.

Based on the likelihood of the product and the associated impacts, a threat may be categorized to different levels of threats. A good example of such is that simple classification of the threat of CommDev may be of high, medium and low risk respectively. Another classification that may be approached may obviously be possible on a scale of 0-10. The levels of risks may reflect on the specific task priority. Risks which are high to occur are given highest priority and urgency in the next risk management process. Risks which are medium should always be addressed by the risk mitigations but with a less urgency. Lastly is that the low risk are acceptable with or without mitigation and they may be migrated even the resources are insufficient.

This is safely assumed that CommDev has some limited resources in devoting to the security. It may be infeasible for one to defend all the information against all the possible threats. There are in some cases where there are is a certain risk levels being accepted. Mitigation is a process where one strategically invest the resources which are limited in changing the risks which are unacceptable in ones which are acceptable (Tomas, 2015). The technical changes involved are such as security devices such as the cryptography, access controls, systems of intrusion detection, backup’s devices, among others. When one is given an output for the processed risk assessment, there is an assumption of the risk or mitigation of such risk. The assumption of the risk refers to all the risks which are chosen and needs to be accepted. The risks which are acceptable may be generally the low risks, but in a real sense,, there is need to do a careful analysis on the cost-benefit which should be done in determining the risks that are to be accepted. The following are some of the options when risk mitigations should be chosen.

Challenges Faced by CommDev

1. Risk avoidance. This attempts in eliminating the cause of risks. A good example is when one tries to eliminate the vulnerabilities and threat possibilities. A good example is the common vulnerabilities which are remedied where the application of up-to-date patches are made.

2. Risk Limitation. This has been attempting the reduction of risks to levels which are acceptable. This is done by implementation of controls which are used to reduce the impact and the frequency expected.  A good example is that the firewalls of CommDev and their access controls are hardened in the manner that they will be so difficult for the attackers externally in gaining the access to the organization network. The controls which are corrective may help in reducing the attack effects. Detective controls may discover all the attacks and trigger all the controls which are corrective (Boysone, 2010).

3. Risk transference. This may refer to the reassignment of the risk to other parties. In this case, CommDev can use Insurance in reassigning its risks which will allow them in avoiding the risk of potentially catastrophically losing all the exchanges of the fixed losses.

Risk Mitigation may be explained using the five steps which are explained as follows.

1. Actions prioritizations. All the risks with the associated corresponding levels if they are identified through the process of assessment will be suggest the actions which are to be taken.

2. Identifying the possible controls. This step is for examining all the possible actions to be applied in mitigating risks.

3. Cost-benefit analysis. In each organization, the main aim is to have benefits and in this case, CommDev will do mitigation of risk as an exam of trading off between the expenses and benefits all the related options used for controlling.

4. Select controls for all the implementation to be done.  Previous explanation done on cost-benefit was used in defining and deciding the controls to be applied in the implementation of goals of the CommDev.

5. Assignment of responsibilities. Implementation of such will be depending on one person with his or her appropriate skills. The personnel might be available in CommDev, but there are in other cases such that the organization may opt to delegate its responsibilities to another party like the way it has done with its corporate system via MicroForce. Another scenario where there have delegated their web services to web services and hosting companies which have helped in them updating their websites.

Operational, Tactical, and Strategic Challenges

6. Implementation. The controls which are chosen must be implemented by the personnel responsible for such tasks

This is the process through which one can measure and verify all the risk objective which are expected to be achieved. When assessment and mitigation risks which are discrete are done at different times, the effectiveness of the evaluation in the process should simultaneously go on.  There are two practical reasons to as why this process exists in risk management.

Risk assessment may be entirely a science inexact. The related uncertainties to the real range of threats, threats likelihood, their impacts, and frequency which is expected. In the risk process of mitigation, there are some uncertainties in the cost estimation and the benefit associated with each option of control.  These uncertainties may result in one misjudging the plans of risk mitigations. An assessment of either success or the failure in mitigation of risks plans is very much necessary. It offers provisions which are useful in giving feedback into the process which will help in ensuring the correctness (Labuschagne, 2015).

Secondly, the environment of CommDev is not expected to remain static in any way. Over time the organization such as CommDev network, computers, software platforms and personnel’s and much more the policies all will change.  Risk assessment and mitigation should be repeated and updated simultaneously to help in keeping the system with the current status.

Conclusion.

Information security is an ongoing process which is used in managing of the risks. One may say that risk management will be essential in making any decision in CommDev. Stages in the risk assessment change are used and applied as the information collected as input and used when making decisions. Mitigation of risks stage will be the actual decision making and implement the strategy that results. Effectiveness evaluation is termed as the continual feedbacks into the making of the decisions.

Although the methods which are currently used may have some room for improvement, the management of risks may undoubtedly serve as a very valuable and the practical function for CommDev. CommDev may be faced with needs which might be pressing such as the security and risk management offering provisions of methods which are used in determining and justifying the allocation of all the resources which are limited to needs of the security.

References

adrofee, A., 2016. managemeng of IS risks in the approach of actave, MA: Addision Wesley.

Blakley, M., 2012. IS in IT risk managements. Stockholm, ACM workshop on the new IS systems paradigms.

Boysone, S., 2010. Networking in the world in digital security, New York: john Wiley & sons.

jaquith, G., 2013. reason to as why the future belongs to quantt. Information security (IS), 1(4), pp. 24-32.

Kilner, H., 2010. is Risk mitigationn enough?. A risk management approach to computer security, 3(2), pp. 12-19.

Kurtz, M., 2016. Exposition of Hack. security secrets and solutions in networking. , 3(1), pp. 09-17.

Labuschagne, V., 2015. Computer scinece and IT journal. framework applied in comparison of differnt IS risk analysis methodologies, 3(1), pp. 95-103.

Loeb, G., 2012. investment of IS in Economy. Transactions and ISS journal, 5(1), pp. 438-457.

Microsoft, 2014. Guide on Risk management in security. [Online]
Available at: https://www.microsoft.com/technet/security/topics/complianceandpolicies/secrisk/default.mspx.
[Accessed 12 October 2018].

navathe, f., 2012. ACM internation conference of Computing. management of vulnerabilities of IS to incidences of security, 2(1), pp. 348-354.

NIST, 2013. Guideline on the testing of network security. IT systems guide on risk managements, 4(2), pp. 23-34.

Reinhard, D., 2011. Key elemets which are used in approaching the risk managements, New York city: US general accounting office.

Renaldo, m., 2017. security cost analysis. [Online]
Available at: https://iis-db.stanford.edu/pubs/11900/soohoo.pdf.
[Accessed 12 October 2018].

Tomas, P., 2015. Risk analyis on the IS, New York City: Aurebach.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP