13 Dec 2022

65

Global Finance Inc. (GFI) Security Risk Assessment

Format: APA

Academic level: University

Paper type: Research Paper

Words: 4239

Pages: 16

Downloads: 0

1. Overview 

Global Finance Inc. (GFI) is a financial company that offers account management services to numerous accounts across three chief regions that include Canada, Mexico, and the United States (US). GFI is a public traded company that is traded on the New York Stock Exchange (NYSE). The company focuses on financial management, wholesale loan processing, loan application approval, and investing money for their customers. The company will be referred to as GFI for the rest of the paper. 

GFI is concerned with cybersecurity in the firm as a result of previous events that brought attention to the numerous vulnerabilities within the company’s system. The first event that shed light on one of the weaknesses that occurred in 2013, where GFI’s Oracle database server was attacked. consequently, the customer database lost its confidentiality, integrity, and availability for a couple of days. The company was eventually able to reestablish the Oracle database server, and there were several adverse consequences. The company’s reputation was tarnished as a result of the loss of confidentiality, accompanied by financial losses since the company had to recompense a lump sum to their customers as a settlement for the loss of data confidentiality. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Another event that became a cause of concern for GFI occurred in 2014. A malicious virus infected the whole network for some days and paralyzed use of the Oracle serve once again. GFI was forced to close the Oracle and the email servers for them to be quarantined. The company did not know how the malicious virus infected the network. There were three possibilities that were considered as a source of the malicious virus that included a malicious email, a USB flash drive, or downloaded from the internet. As a result of the attack, the company lost $1,700,000 in revenue. Additionally, the company also lost its customers’ confidence and trust. 

In a separate event during the same year, a company employee neglected to protect company property and left his company laptop unattended in the airport. The laptop, which contained customer financial data, was stolen. To make matters worse, the hard drive was unencrypted. GFI again had to compensate its customers for the loss of confidentiality. Lastly, in 2015, a laptop running network sniffer software was discovered plugged into a network jack hidden in one of the empty offices. From the reports of numerous attacks, it is evident that GFI should implement information security measures to condense the risk of impending attacks and restore its customer’s trust. 

GFI values confidentiality, integrity and availability. Therefore, the attacks and vulnerabilities are a source of concern since they contradict the company’s values. Chief Operation Officer (COO) Mike Willy is especially troubled by the growing operational dependence on technology services and the dwindling IT footprint. GFI’s Chief Executive Officer (CEO) is pushing to subcontract IT services, a move that COO Willy opposes. This report describes the results of the quantitative and qualitative risk assessment on GFI and discusses the possible improvements that could be made to diminish the risk of impending attacks. 

1.1 Aim 

The security risk assessment is being performed to provide a quantitative and qualitative risk assessment of GFI’s infrastructure. Having a reliable estimate will help in identifying vulnerabilities and determining the areas that require improvements. The corporate office network topology will be assessed after which vulnerabilities will be identified and addressed. The risk assessment will; 

Identify present threats to the company’s IT security, customer data, strategic capabilities, and business intelligence. 

Identify weaknesses and vulnerabilities associated with the current security control measures and company processes. 

Provide security controls and authorizations grounded on the data obtained from the assessment. 

Assess the financial and business impact of identified threats and vulnerabilities. 

Assess risks and describe acceptable risk levels. 

Give recommendations for fortifying GFI’s security infrastructure utilizing conventional technologies and evidence-based processes. 

1.2 Roles and Responsibilities 

John Thompson, CEO 

The CEO’s role is to guarantee that there are no inconsistencies between the company’s espoused values and the business and corporate strategies. He is also responsible for ensuring that GFI’s long-term business and corporate strategies align with shareholder values. The CEO is also responsible for considering and approving various decisions and change requests within the organization, in line with the company’s hierarchical structure and top-down management approach. 

Mike Willy, COO 

The COO is responsible for supervising ongoing business operations. He is second on the company’s hierarchy and acts as the second in command to GFI’s CEO. Willy is responsible for assessing IT projects and their alignment with normal business operations. The COO is also concerned with the provision of input and implementation of GFI’s strategic plan. He is also responsible for overseeing the budget and progress concerning IT projects. 

Computer Security Manager (CSM) 

The CSM is mandated to overseeing the development, implementation, and management of GFI’s security vision, strategies, and programs. The CMS’s area of interests is mostly concerned with technological issues, security policy development, and performance of research. His chief role is to secure GFI’s network availability, confidentiality, and integrity. He does this by identifying system threats and vulnerabilities to support the optimum achievement of business objectives, identify and oversee the implementation of security control measures, and determine risk acceptability levels to lessen project letdowns. 

2. Security Risk Assessment 

There are numerous information security risk assessment methods that can be used for GFI’s security assessment. Past methods have been dependable over the last few decades. The methods provided a reliable tool for organizations to protect themselves against pertinent risks associated with various business and corporate strategies. However, the advancement of the Internet of Things (IoT) has led to an increase in complexity, pervasiveness, and automation of technology used by companies such as GFI (Nurse et al., 2017). 

Additionally, cyberspace continues to experience continuous maturity. As a result of the factors stated above, there is a need to consider new assessment methods that conform to the current systems and strategies. The method chosen must consider all the risks that are associated with the current ecosystem. Risks associated with the new ecosystem are associated with an upsurge in connectivity, and the coupling of digital and cyber-physical systems. The assessment methods considered must also build trust among employees and customers (Nurse et al., 2017). 

The following risk assessment includes an analysis of what could go wrong, the chances that something could go wrong, and the consequences. Selected risk management strategies and methods will build upon the risk assessment. They will be used to determine the possible management approaches and their availability, the associated tradeoffs related to expenses, benefits, and risks. The security assessment methodology selected for this paper is the cyber vulnerability assessment methodology. 

The cyber vulnerability assessment methodology consists of five main steps that have to be followed with the discretion of the assessment team and leaders. The first step is the development of an assessment plan that outlines the budget, schedule, goals, resources, and required experts for the assessment. The second step involves the configuration of the testing environment to ensure that it is safe. Third, the vulnerability assessment will be done using a penetration test. The penetration test will be conducted externally to the tested system machine. Fourth, the assessment and testing methods used will be properly documented for future reference. Lastly, quantitative measurements of GFI’s security will be taken to allow benchmarking against other systems ( Cherdantseva et al., 2016)

2.1 Risk Impact 

The following table adapted from the National Institute of Standards and Technology (NIST) (2004) summarizes the risk impact associated with the three main considerations in GFI’s security objectives, i.e. confidentiality, integrity, and availability. 

Table 1 . Potential Impact of Security Objectives. 

2.2 Corporate Office Network Topology 

The GFI network infrastructure is composed of a corporate-wide area network (WAN) that spans across ten remote facilities. The facilities are unified to the GFI headquarters’ central data processing environment. Customer information is conveyed from a remote site using a virtual private network (VPN) gateway appliance. The gateway appliance forms a VPN tunnel where the VPN gateway is located in GFI’s headquarters. Remote office users use the VPN connection to get access to the internal Oracle database and update customer information in the customer data records. 

2.3 Network Security 

GFI encourages its employees to work from home. The objective is supported by the use of both dial-up and remote VPN access. Dial-up services are offered using Private Branch Exchange (PBX) and a remote access server while VPN remote access is provided via the VPN gateway. Employees are also encouraged to bring their own devices to work according to GFI’s policy. The devices use a wireless antenna that supports wireless networking within the organization’s headquarters. Wired equivalence privacy (WEP) is used to ensure wireless privacy for all employees who bring their own devices to work. 

VPN is defined as a private data network that exploits civic telecommunication infrastructure while maintaining privacy through the use of tunneling protocol and security measures. GFI uses a remote VPN that supports the movement of employees when needed. Using a remote VPN allows employees to work wherever there is internet connectivity. It gives employees secure access to GFI’s central network. Software is installed in the employee’s device. The employee then gets a unique username and password for access. A virtual tunnel is also used to securely transmit data over an internet service provider (ISP) network. The VPN tunneling protocol used is the point-to-point tunneling protocol (PPTP). The use of PPTP is disadvantageous since it causes several risks. PPTP does not offer encryption or authentication features (Ahmed et al., 2016). This makes the system vulnerable to cyber-attacks from external sources, thus decreasing confidentiality. 

2.4 Access Points 

2.4.1 Internal Access 

GFI employees can have internal access to the Oracle servers using thoroughly pre-inspected and updated personal workstations. The personal work stations have anti-virus software that is updated and maintained by the CSM. The internal network technology is characterized by multi-layer switches that connect to six access layer VLAN switches. The six switches separate the various departments, including Accounting, the Loan Department, Management, Credit Department, Finance, and Customer Services departments. Employees will only be given access privileges depending on need-to-know criteria. This will limit the number of people that have access to the servers, support accountability, and make security breach assessments easier and more reliable. 

The network is also characterized by a firewall that can be used to monitor personnel access and other external parties. The firewall will be used to control incoming and outgoing traffic. The firewall will also be used to ensure that all devices, including those from users who bring their own devices to work, adhere to security standards or rules before they are allowed into the internal access points. An access control list (ACL) will also be developed to determine all employees that have access to every departments VLAN. This will ensure accountability in the various departments since not all employees have access to other departments’ data. 

The ACLs are a group of commands that filter the traffic that leaves and enters the network. It allows the network administrator to decide who enters or leaves the interface. The ACL also restricts telnet, filters the network’s routing information, and prioritizes GFI’s traffic using queuing. Some of the benefits associated with using ACLs include the reduction of network traffic, improvement of network performance, ability to control the flow of traffic, and support of decision-making processes within the organization (Suman & Agrawal, 2016). 

Apart from the use of a firewall and ACLs. GFI can also depend on group policy objects (GPO). Group policy is one of the features in the Microsoft Windows Active Directory. The feature provides additional control and management features for device users and computer accounts. The GPO is assigned by linking the objects to various containers that include sites, domains, and organizational units (OUs) in an Active Directory. It is the role of the CSM to determine the policy settings that apply to the various environments. The machine policies will then be evaluated, followed by a thorough evaluation of the site, domain, and OU policies (Krahl, 2017). 

2.4.2 External Access 

External access is ensured by utilizing a remote access server (RAS). The RAS is linked to several distribution routers, which are part of two border routers that separate GFI’s network from the internet. External access is also ensured using VPN gateways. Employees who access the network using dial-up are obligated to follow the standard authentication procedure to screen unwanted traffic. One of the chief concerns regarding internal access is the absence of data encryption in data transmitted across the VPN virtual tunnels. This vulnerability acts as a critical threat to the system’s confidentiality, integrity, and availability. 

3. Access Control 

Access control algorithms will be used to decide whether a new internal or external connection is accepted after the communication quality has been ascertained. Whenever a new service call is detected, the call will be processed depending on whether the bandwidth is available in the community. In case the required bandwidth is unavailable, the service call will be castoff or put on a waiting list. 

3.1 Authentication 

The authentication process will be secured by performing an analysis to determine whether the protected protocols are secure. Session keys will be created as a form of authentication. Each access run will be assigned a different session key. The keys will be developed in a random manner, whereby the familiarity of previous session keys will not allow the inference of upcoming keys. The session key will be calculated by a one-way hash and session secrets. The random number generated will be discarded after the expiry of a session (Liu et al., 2012). 

An asymmetric key will be used to encrypt both incoming and outgoing messages. Messages can only be encrypted by a single key and decrypted using another key. For GFI, the public key will be issued while the private key will be kept secret. The asymmetric pair of keys are different in that one if the public and the other is private. The public key can be published and known by every employee within the organization, but the private key is unique to each owner. Therefore, only the owner can distinguish and utilize the private key. Each employee will have both keys. The public key will be centrally stored and accessible to everyone, while the private key is stored by the user. Employees will be required to use both keys when sending an email. The receiver’s public key is used to encrypt the data while the sender’s private key is used to sign the email. 

There are various authentication methods utilize by varied companies. These methods ensure the security of the networks and topology infrastructures. Possible options to be considered for GFI include Password Authentication Protocol (PAP), smartcard biometrics, and Single Sign-On. 

3.2 Privilege Access 

Privileged Access is defined as access that allows various individuals who can take actions which may have an impact on computing systems, network communication, and data from other users. Privileged access for the GFI network will only be given to network administrators, system administrators, and a few other employees that are involved in the IT department. All privileged access users must have an individual account that is characterized by a unique username and passwords. The passwords must comply with the company’s password policies regarding strength. Access to the password storage system will be controlled by multi-factor authentication. 

The access control will follow the principle of least privilege. According to this principle, privilege access employees will only have access to data required for the accomplishment of their job function. The CEO is responsible for approving all privilege access accounts and review all the users annually. Reviews will be performed to determine whether the users need access to information and whether the current access is appropriate for the performance of business functions. Privilege access users will only have access to data on a need to know basis. They will only have access to and knowledge of information required to perform their job functions. 

Each department is responsible for the separation of duties achieved by separating the various roles and responsibilities. The CMS is also expected to perform a regular review of the system logs to monitor privilege access user accounts. The logs must be securely stored in a centralized system that ensures the integrity and access to the accounts is controlled. All employees with privilege access must respect the rights of all the system users within the organization. They must also respect the company objectives in terms of confidentiality, integrity, and availability. Access to other individual’s information is limited to the least content and the least action required to resolve any challenges or situations. Privilege access is also reserved for mandatory tasks that require privilege access ( Jayabalan & O’Daniel, 2016)

3.3 Mobility 

Mobility is critical since it ensures that all employees and clients can interact with an organization as efficiently as possible by supporting real-time interaction. Mobility is critical for the enhancement of productivity within the organization. It supports the development of a virtual environment or offices where employees can get access to GFI’s servers and work from any geographical location as longs as they have an internet connection. Mobility is likely to increase employee satisfaction, thus promoting better customer services. GFI’s bring your own device (BYOD) policy is also beneficial to the company as it supports mobility. However, one of the chief concerns that arise from the BYOD policy is that external computers with malware can infiltrate the company. Without control of how many devices an employee can bring, there is a risk that some of the devices could be used to smuggle customer information, thus compromising the company’s integrity and confidentiality. 

Mobility also promotes employee freedom where the company gives employees the trust and freedom to work at any time and during any time according to their preferences. As long as employees are able to access their work resources, they can fulfil their job functions. Mobility encourages high levels of productivity by creating a happier workforce. Mobility also increases the company’s reliability and availability. GFI could enhance its connectivity using mobile devices such as tablets and smartphones, thus maintaining customer loyalty and improving customer services. Through enhancing mobility, GFI is also able to support collaboration between different coworkers and departments regardless of where the employees are based. 

Though mobility is associated with several benefits, there are also a few disadvantages that must be considered in mobility considerations. Mobility is supported by providing remote access to the company’s Oracle server. Providing remote access to work resources increases the possible vulnerabilities and the threat of data breaches. Mobility is also associated with fragmentation of work applications and data, which makes securing the data more difficult. 

3.3.1 Wireless 

Having wireless connectivity within GFI promotes flexibility for all the employees. However, the GFI wireless network is not encrypted, which increases the risk of breaching data. The company’s service set identifier (SSID) has no access restrictions. Therefore, anyone located within the WAP range can access it. This is counterproductive and creates a high level of risk for the integrity, confidentiality, and availability. GFI should adopt a personal information protection approach based on RSA. Through this approach, all the information being transmitted within the network must be transformed from plain text to ciphertext. The system administrator is responsible for giving permission for authorization management. System administrators will be expected to devolve the authorization to the database administrators. These administrators will then input the information into the database ( Khatarkar & Kamble, 2015)

3.3.2 Cloud Computing 

Embracing cloud computing will enable GFI to provide reliable online services to their customers, thus improving the company’s customer services and productivity. Though cloud computing e-commerce is associated with numerous benefits, it is also important to consider that there are several security concerns associated with the use of e-commerce services. One of the chief concerns is data breaches that might occur due to the provision of remote access (Avram, 2014). This makes the system more vulnerable and adversely affects the integrity, confidentiality, and availability of the network system. Cloud computing also makes it possible to hijack accounts. With cloud computing, external parties might have access to employees’ login details to remotely access sensitive information, that if released, would lead to financial losses and loss of credibility. 

Another risk that exists with the use of cloud computing is an insider threat, where employees with authorized access or misuse information available in the customer accounts. The misuse of information could be through malicious intent, malware, or accidents. This can be mitigated using privilege access and other access control methods. The cloud computing service is also vulnerable to the injection of malware from an internal or external source. When the malware injection is executed, the cloud begins operating in tandem with the malware, allowing attackers to eavesdrop and steal data. This compromises the integrity of customer information. These challenges can be avoided by using data encryption and privileged access (Avram, 2014). 

4. Inventory 

Item Department 

Quantity 

Cost 

Total Cost 

Priority 

Mission Objective 

Dell Precision Workstations Accounting 

45 

$400 

$18,000 

High 

Provides accounting and financial management services. The department is also responsible for providing financial support to GFI and performing payroll responsibilities, and inventory. 
Credit 

10 

$500 

$5,000 

High 

Quantity, monitor, and allay credit risk, credit limits, and credit support arrangements. 
Customer Service 

15 

$500 

$7,500 

Moderate 

Identifying customer issues, preventing the provision of poor services, and finding solutions to customer service issues. 
Finance 

50 

$500 

$25,000 

Very High 

Developing and implementing budget estimates and plans, managing company finances and forecasting resource needs, reporting on financial progress, creation of value, and ensuring compliance to company, and legal statutes. 
Loans 

15 

$300 

$4,500 

Moderate 

Obtains and processes all loan applications. 
Management 

25 

$500 

$12,500 

High 

Oversees all company operations, and ensures alignment of company processes with company values and policies. 
TCB Network 

15 

$500 

$7,500 

High 

Core support team has its intranet web 

server, an email system, and other support personnel workstations 

Subtotal 

175 

 

$80,000 

  
      
HP LaserJet Printers Accounting 

10 

$400 

$4,000 

  
Credit 

$400 

$2,000 

  

Customer Service 

$400 

$400 

  
Finance 

$400 

$2,000 

  
Loans 

$400 

$1,600 

  
Management 

$400 

$400 

  
TCB Network 

  
Subtotal 

26 

 

$10,400 

  
      
Wireless Access Point  

$500 

$2,000 

High 

 
Private Branch Exchange  

$1,000 

$2,000 

Medium 

 
VPN Gateway  

$30,000 

$60,000 

High 

 
Border Routers  

$25,000 

$50,000 

High 

 
 Subtotal 

10 

 

$114,000 

  
       
Grand Total    

$204,400 

  

Table 2 . GFI Inventory 

 

5. Network Vulnerabilities 

 

Risk Matrix Legend 

Probability Level 

 

Impact Level 

Criteria 

 
High (H)  High (H) Critical  
Medium (M)  Medium (M) Marginal  
Low (L)  Low (L) No Impact  

Table 3. Risk Matrix Legend 

System/Entity 

Vulnerability 

Risk Level 

Priority 

Wireless Technology 

The wireless network accessible by both company employees and the neighboring individuals. This poses a high risk that adversely impacts the confidentiality, integrity, and availability of the system. 

High 

High 

Encryption 

There is no data encryption of information being transmitted across the virtual VPN tunnel, which increases the risk of data breaching, thus reducing the confidentiality of the customer data. It constitutes a high risk to the CIA. 

High 

High 

Mobility 

Mobility increases the risk of data breaching and malware injection. It also increases the risk of malicious attacks from within the organization or from external parties. There is no way to screen devices brought into the headquarters, making the network vulnerable to malware. 

High 

High 

Network Intrusion 

A significant surge in network traffic into the internal networks. The source of the increased traffic is unknown, but the company is able to determine the traffic volume. Unwanted traffic can be reduced by using a firewall and frequently reviewing access logs to ensure that only authorized users have access to the network. 

High 

High 

Cloud Computing 

Cloud computing is susceptible to data breaches if not suitably secured. 

High 

High 

Table 4 . Network Vulnerabilities 

6. Risk Mitigation Measures 

GFI’s current network topology and IT processes are characterized by numerous vulnerabilities that must be mitigated to ensure the safety of customer information and restore the company’s reputation in terms of data confidentiality. Mitigation measures could be founded on either soft or hard security controls. 

6.1 Wireless Access 

The current wireless network uses an open authentication technique that is unreliable in ensuring that only approved individuals have access to the network. With the current authentication practices, it is possible for anyone with a Wi-Fi-enabled device and located within the WAN geographic scope to access the network and customer information. It creates a risk for confidentiality. Unauthorized users can access sensitive and private information that would lead to monumental financial losses, loss of customers, and tarnishing the company’s reputation. It exposes the company to numerous threats that include data interception and eavesdropping. The attacks from external sources are likely to injure the company’s reputation. Injuries to the confidentiality, integrity, and availability of company data could be qualitative or quantified. 

Below are some of the mitigation measures that could be implemented to reduce the mentioned threats; 

The first measure is using a network sniffer as a diagnostic tool. The network sniffer operates in promiscuous mode, allowing it to open any and all packets on the network. The network sniffer operates with a network card. It also has a software that captures data on the incoming and outgoing traffic, and sorts out the traffic according to individual stations on the network (Breeding, 2009). 

Network cloaking can also be used by hiding the SSID within the company’s framework. Therefore, the SSID name will be invisible. It will act as a way to ward off unwanted and unexperienced network users. Hiding the SSID should be used in conjunction with encryption. 

The company must ensure that they eliminate all rogue access points within its network. Positioning a wireless network in an inappropriate security zone compromises GFI’s overall security. Therefore, the rogue access points should be removed or transferred to exist within the company’s office network and support system. 

Another security strategy is separation and segregation where the company ensures that business will run as usual in case something happened to the VLAN. This can be done by ensuring that the wireless network is physically separate (Breeding, 2009). 

6.2 Encryption 

The encryption technology recommended for utilization by GFI is the IPSec encryption technique. The technique will be used to secure all data transfer processes passing through the GFI network, VPN, and TCB communication. The IPSec encryption technique is based on the use of packet filtering and cryptography. Cryptography supports confidentiality, integrity, and availability by offering user authentication measures. It also created trust in the communication process. User authentication and encryption of data are critical for securing data traffic running through GFI’s network paths (Salman, 2017). 

6.3 Mobility 

The use of cloud e-commerce and the BYOD policy creates several risks for the company. Mitigation of these risks requires the implementation of the following measures; 

Segregation and separation of GFI resources from the users. Privileged access will be used to ensure that users only have access on a need to know basis. It will also ensure that users only have access to the information essential for the performance of their job functions ( Jayabalan & O’Daniel, 2016)

Smart cards and PAP will be used to control access to the GFI network, thus reducing unwanted traffic. 

Reliable security software should be installed in all devices that are connected to the network. The software should be frequently maintained and updated to ensure that the network is protected against emerging threats. 

6.4 Network Intrusion 

The unexplained spike in network traffic recorded by GFI could be solved by using a firewall that scrutinizes, and authorizes or blocks access to the network. Penetration test programs could also be used to adequately ensure the security of customer and company data ( Cherdantseva et al., 2016)

7. Assumptions 

The following assumptions were made in the performance of the security risk assessment and reporting for GFI; 

All employees are expected to report any suspicious traffic and security issues they encounter while using the network. 

All employees will be responsible and adhere to company guidelines regarding information security. 

Employees will not disclose company or customer information. 

The CSM is responsible for overseeing the creation and implementation of data security measures and policies. 

8. Conclusion 

Some of the chief objectives in GFI are the maintenance of the confidentiality, integrity, and availability of company data. The company is a financial company that possess very sensitive data, where the loss of data or unauthorized access would cost the company its reputation and financial losses. It is, therefore, important for the company to understand and measure all possible vulnerabilities and threats. Doing so is made possible by the use of a risk assessment and management plan. Based on the report provided, it is evident that GFI is in need of an internal IT department. 

References 

Ahmed, F., Butt, Z. U., & Siddiqui, U. A. (2016). MPLS based VPN Implementation in a Corporate Environment.  Journal of Information Technology & Software Engineering 6 (5), 1-7. 10.4172/2165-7866.1000193 

Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.  Procedia Technology 12 (0), 529-534. 10.1016/j.protcy.2013.12.525 

Breeding, M. (2009). Wireless Network Configuration and Security Strategies.  Library Technology Reports 41 (5), 21-30. 

Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems.  Computers & security 56 , 1-27. https://doi.org/10.1016/j.cose.2015.09.009 

Jayabalan, M., & O’Daniel, T. (2016). Access control and privilege management in electronic health record: a systematic literature review.  Journal of medical systems 40 (12), 261. https://doi.org/10.1007/s10916-016-0589-z 

Khatarkar, S., & Kamble, R. (2015). A survey and performance analysis of various RSA based encryption techniques.  International Journal of Computer Applications 114 (7). 

Krahl, K. M. (2017).  Using Microsoft Word to Hide Data  (Doctoral dissertation, Utica College). 

Liu, J., Xiao, Y., & Chen, C. P. (2012, June). Authentication and access control in the internet of things. In  2012 32nd International Conference on Distributed Computing Systems Workshops  (pp. 588-592). IEEE. 10.1109/ICDCSW.2012.23 

Nurse, J. R., Creese, S., & De Roure, D. (2017). Security risk assessment in Internet of Things systems.  IT professional 19 (5), 20-26. 10.1109/MITP.2017.3680959 

Pub, F. I. P. S. (2004). Standards for Security Categorization of Federal Information and Information Systems.  NIST FIPS–199

Salman, F. A. (2017). Implementation of IPsec-VPN tunneling using GNS3.  Indonesian Journal of Electrical Engineering and Computer Science 7 (3), 855-860. 

Suman, S., & Agrawal, E. A. (2016). IP traffic management with access control list using cisco packet tracer.  Int. J. Sci. Eng. Technol. Res 5 (5), 2278-7798. Available at: https://www.researchgate.net/profile/Shipra_Suman2/publication/304627953_IP_Traffic_Management_With_Access_Control_List_Using_Cisco_Packet_Tracer/links/5775749508aead7ba06fff33/IP-Traffic-Management-With-Access-Control-List-Using-Cisco-Packet-Tracer.pdf [Accessed 24 June, 2020] 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Global Finance Inc. (GFI) Security Risk Assessment.
https://studybounty.com/global-finance-inc-gfi-security-risk-assessment-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

How AI Can Help Retailers Solve Business Problems

The global marketplace is currently more integrated than ever before. This situation presents a never-before experienced opportunity for retailers. Multinational organizations whose sole basis is the internet have...

Words: 2700

Pages: 5

Views: 138

The Natural Organizational Model and the Informal Groups

The nature of an organization is based on different factors such as the environment it is set up in. also, the type of activity it undertakes. This paper will examine the natural organizational model, the informal...

Words: 3009

Pages: 10

Views: 239

Why Pinkberry should focus on making orange and yellow the two prevailing colours

The fact that Pinkberry has evolved from a storefront to a nationally recognized brand makes this franchise of frozen dessert yogurt shops an example to be followed. Yes, the personality of a brand created a platform...

Words: 582

Pages: 2

Views: 93

Ford Motors: Board Presentation For Electric and Hybrid cars Production

Executive Summary The motor vehicle industry in America and worldwide is highly competitive with major players no longer enjoying the dominance that they had had before. Innovation and identification of trends...

Words: 1088

Pages: 4

Views: 130

Home Remodel Project Plan

Project Overview Home remodeling is one of the notable key projects undertake through project management, as a project manager is expected to come up with a clear plan that would help in meeting the expected...

Words: 2152

Pages: 8

Views: 69

How Airbnb Achieved Success

Hospitality industry includes firms that provide lodging and dining services for customers. Many of the businesses in the travel and hospitality industry offer customers with prepared meals, accommodation, snacks,...

Words: 906

Pages: 3

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration