06 Mar ABC Insurance Company is one of the largest insurance companies in U.S. It has several branches/agents across the nation. Thei
Scenario
ABC Insurance Company is one of the largest insurance companies in U.S. It has several branches/agents across the nation. Their branches can communicate with the central company headquarters and with each other through computer network. Customer information and company sensitive data has to be protected at all times. ABC Insurance Company has database servers, J2EE application server, and web application server for its employers to access. It allows the customers to access insurance policy information, purchase, and change or cancel insurance policies online, and other services. The customers include individual policy holders and business policy holders.
The company employees and the customers need login accounts to access the company servers. The company adopts the JRA architecture for the log-in capability. This infrastructure has many components. Many of the components consist of active directories, web servers, and databases. Each of the JRA architectures has a Business to Enterprise connection which is internal, Business to Customers which is individual policy customers and Business to Business which is business customers with the insurance company. These connections are called realms. Each realm is located at a different physical location.
ABC Insurance Company holds customer information which is a valued asset to the company. The company has to ensure that this information is confidential to have the customers’ trust. The company has to protect the customers’ insurance policies which are the drive for the company's success. Agents’ login credentials and data needs to be secure too.
A problem with ABC Insurance Company is the amount of hours needed to maintain the architecture. ABC Insurance Company wants a different way to implement this architecture. It was suggested to virtualize the JRA architecture. Virtualization can enable processes to share resources more efficiently. This would have different operating systems, web servers, and databases run on a virtual machine. Each realm would run on one machine as a virtual realm. This would cut down component costs, and cut down manpower to maintain the architecture. Two or more realms can run on one machine if they face the same kind of risks.
Case Objectives:
- Identify the vulnerabilities involved in implementing a new technology. Refer to NIST RMF as you will need to include this plan for this assignment.
- Determine the likelihood for a potential vulnerability.
- Create a plan for Enterprise Governance, Risk and Compliance (eGRC) which shall also include a support plan.
- Should include process integration for eGRC, workflows and enterprise change processes. For example, could look ServiceNow Enterprise Management platform.
- Assess risk considering the likelihood of the occurrence of vulnerability, the information asset value, current controls and the uncertainty of current knowledge.
- Determine the adverse impact resulting from a successful threat exercise of vulnerability.
- Formulate a cost benefit analysis on adopting a new technology.
- Assess risk level according to the likelihood of a vulnerability being exploited, and the impact of the vulnerability.
- Recommend risk mitigation strategies for controlling risks.
- Evaluate the risk mitigation strategies.
· Describe Twofish and El Gamal
o Functions
o Strengths and Weaknesses
o Structure and processes
o Alternatives besides tables to thwart timing attacks
o Relevant examples of modern applications/industry that utilize each algorithm
- All must be formulated within a risk management plan cover each section.
Requirements:
• Minimum of 1,250 words / Maximum 1,800 words (Double spaced)
• APA style
• At least 7 works cited
• At least 5 of your references have to be scholarly peer-reviewed articles
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.