Risk Assessment Report

Risk Assessment Report (RAR): This report should be a five- to six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. Use Wireshark to scan your system.
Step 3: Scan the Network

You will now investigate network traffic and the security of the network and information system infrastructure overall. Past network data has been logged and stored, as collected by a network analyzer tool such as Wireshark. Explore the tutorials and user guides to learn more about the tools to monitor and analyze network activities you will use.

Don't use plagiarized sources. Get Your Custom Essay on
Risk Assessment Report
From as low as $9/Page
Order Essay

You will perform a network analysis of the Wireshark files provided to you in Workspace and assess the network posture and any vulnerability or suspicious information you are able to obtain. You will identify any suspicious activities on the network through port scanning and other techniques. Include this information in your SAR.

In order to validate the assets and devices on the organization’s network, you should run scans using security and vulnerability assessment analysis tools such as OpenVAS, Nmap, or Nessus, depending on the operating systems of your organization’s networks. Live network traffic can also be sampled and scanned using Wireshark on either the Linux or Windows systems. Wireshark allows you to inspect all OSI layers of traffic information. Further analyze the packet capture for network performance, behavior, and any suspicious source and destination addresses on the networks.

Hackers frequently scan the internet for computers or networks to exploit. An effective firewall can prevent hackers from detecting the existence of networks. Hackers continue to scan ports, but if the hacker finds there is no response from the port and no connection, the hacker will move on. The firewall can block unwanted traffic and Nmap can be used to self-scan to test the responsiveness of the organization’s network to would-be hackers.

In the existing Wireshark files, identify whether any databases have been accessed. What are the IP addresses associated with that activity? Include this information in your SAR.

Now it’s time to identify the security issues in your organization’s networks. You have previously learned about password-cracking tools; in this step, provide an analysis of the strength of passwords used by the employees in your organization. Are weak passwords a security issue for your organization?

Next, examine these resources on firewalls and auditing related to the use of the Relational Database Management System (RDBMS), the database system and data. Also, review these resources related to access control.

Determine the role of firewalls, encryption, and auditing for RDBMS in protecting information and monitoring the confidentiality, integrity, and availability of the information in the information systems.

Reflect any weaknesses found in the network and information system diagrams previously created, as well as in your developing SAR.

Now that you know the weaknesses in your organization’s network and information system, you will determine various known threats to the organization’s network architecture and IT assets.

Get acquainted with the following types of threats and attack techniques. Which are a risk to your organization?

IP address spoofing/cache poisoning attacks
denial-of-service attacks (DoS)
packet analysis/sniffing
session hijacking attacks
distributed denial-of-service attacks

In identifying the different threats, complete the following tasks:

Identify the potential hacking actors of these threat attacks on vulnerabilities in networks and information systems, as well as the types of remediation and mitigation techniques available in your industry and for your organization.
Identify the purpose and function of firewalls for organization network systems and how they address the threats and vulnerabilities you have identified.
Discuss the value of using access control, database transaction, and firewall log files.
Identify the purpose and function of encryption as it relates to files, databases, and other information assets on the organization’s networks.

Step 7: Risk and Remediation

What is the risk and what is the remediation? What is security exploitation? You can use the OPM OIG Final Audit Report findings and recommendations as a possible source for methods to remediate and mitigate vulnerabilities.

Read this risk assessment resource to get familiar with the process, then prepare a risk assessment. Be sure to first list the threats, then the vulnerabilities, and then the pairwise comparisons for each threat and vulnerability. Then determine the likelihood of each event occurring and the level of impact it would have on the organization.

Include this in your risk assessment report (RAR).

Prepare a risk assessment report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security weaknesses, impact assessments for exploitation of security weaknesses, remediation, and cost/benefit analyses of remediation.

Devise a high-level plan of action with interim milestones (POAM) in a systematic methodology to remedy your findings.

Include this high-level plan in the RAR.

Summarize the results you obtained from the OpenVAS vulnerability assessment tool in your report. The deliverables for this project are as follows:

Risk Assessment Report (RAR): This report should be a five- to six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. For more information on Risk Assessment Report check on this: https://en.wikipedia.org/w/index.php?search=Risk+Assessment+Report

Impact of International Actors

The Homework Writings
Order NOW For A 10% Discount!
Pages (550 words)
Approximate price: -

Our Advantages

Plagiarism Free Papers

Thehomeworkwritings.com’s team of writers write all papers from scratch. We deliver 100% original, unique papers. That’s what makes us the best custom homework writing service

Free Revisions

We provide unlimited free revisions to all customers and on all papers. Try The Homework Writings today for the best custom homework writing service and experience in the industry.


Thehomeworkwritings.com gives clients title pages free of charge. Your only job is to fill out our order form. We will handle the rest.


As the leading essay writing service, we never submit any paper without a reference/bibliography page. We do this free of charge too.

Originality & Security

At Thehomeworkwritings.com, we take great pride in delivering only high-quality 100% original papers to all our clients. We also never share any of our clients’ information with third parties. Your data is safe with us.

24/7 Customer Support

No other custom homework writing service has a friendly, always available customer support team to respond to clients like us.

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Why outsource our services

We have the best customer support team for your essay writing needs.


Flexible Pricing

You won’t find any other custom homework writing service with pricing as flexible and affordable as ours.


Admission help & Client-Writer Contact

We provide a direct line of communication with our writers for the best writing experience.


Paper Submission

As the leading custom homework writing service, we take deadlines very seriously. You will have your paper submitted on time without any delays.


Customer Feedback

We truly value your feedback, good or bad, and always use your feedback to help us provide you with an even better custom homework writing service