0% found this document useful (0 votes)
46 views3,282 pages

Risk Assessment 1

Uploaded by

robertbillatte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views3,282 pages

Risk Assessment 1

Uploaded by

robertbillatte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 3282

SERIAL NO IDENTIFIED ASSETS IDENTIFIED THREATS

1 INFORMATION ASSESTS
paper documents
digital documents
password
digital files
database
2 PAPER ASSETS
policies
contracts

3 SOFTWARE ASSETS
applications
operating system

4 PYSICAL ASSETS
mouse
keyboards
chairs
ethernet cables
power supply
5 PEOPLE
students
technicians
lecturers
6 COMPANY IMAGE AND REPUTATION

7 SERVICES
learning
internet service
computing service
VULNERABILITIES I-V PAIRING
JARAMOGI OGINGA ODINGA UNIVERSITY OF SCIENCE AND TECHNOLOGY
COMPUTER SECURITY AND FORENSICS

Computer Security Risks Management and Control


PLACE OF RISK ASSESSMENT: COMPUTER LAB 2

MEMBERS INVOLVED: 1.CHEPKIRUI ABIGAIL


2.ATE ROBERT ARINGO
3.NASHON NYAMBU MWAKOTO
4.KIPKIRUI WELDON SANG
5.ATHMAN ADE JILLO

SERIAL NO IDENTIFIED ASSETS IDENTIFIED THREATS

1 INFORMATION ASSESTS
paper documents theft,forgery,i
digital documents ransomware attack
password phishing
database ransomware attack
2 PAPER ASSETS
lab rules theft

3 SOFTWARE ASSETS
applications exploit kits
operating system botnets

4 PYSICAL ASSETS
mouse theft
keyboards theft
chairs theft
ethernet cables theft
Air conditioner theft
Monitors theft
System Units theft,ransomware
projector theft

5 PEOPLE
students social engineering attack
technicians social engineering attack
lecturers

6 COMPANY REPUTATION
image of the lab
7 SERVICES
learning power loss
internet access social media attacks,trojans
computing service malware
SCIENCE AND TECHNOLOGY
ORENSICS

ent and Control


MPUTER LAB 2

VULNERABILITIES

unsecured documents
not encrypted
weak mechanisms
not password protected

within reach of users

outdated applications
old operating systems

poor sealing mechanisms e.g wires


poor sealing mechanisms e.g wires
can be moved
long cables
within reach of users
not sealed

na

unstable power supply


unblocked sites
no antimalware softwares
JARAMOGI OGINGA ODINGA UNIVERSITY OF SCIENCE AND TECH
COMPUTER SECURITY AND FORENSICS
PLACE OF RISK ASSESSMENT COMPUTER LAB 2
ERSITY OF SCIENCE AND TECHNOLOGY
RITY AND FORENSICS
SMENT COMPUTER LAB 2

You might also like