Wednesday, May 6, 2020

IIL LIPPA Project Threat Model Samples †MyAssignmenthelp.com

Question: Discuss about the IIL LIPPA Project Threat Model. Answer: Introduction The primary purpose of the report is to prepare a threat model for IIL Location Intelligence for Policy Profile Assessment (LIPPA) Project. The threat model identifies major threats that have significance over the LIPPA project and RAP application utility (Miller Ager, 2013). This model clearly relates identified threats along with specific security, performance, and cost consideration. Application of LIPPA Project: Description RAP (Risk Analysis Project) application is the foremost and existing Risk Analysis and Impact Analytics service provider to IIL. RAP is hosted to virtual in-house platform in IIL Data center. This particular risk analytics solution is effective for defining singular platform with supporting enormous amount of generated data from in-house and cloud platforms. Threat Identification and Definition The threat identification and definition is discussed as following: Storage Threat: The storage requirement is primarily 10 TB and later it is estimated that 10 TB backup storage is required for extension of database (Olivo, Santin Oliveira, 2013). Therefore, backup storage should be attached with existing storage of database; otherwise chance of losing data exists. Security Threat: Big data should be implemented in this scenario, for cloud storage security options. Henceforth, the threat exists under the circumstance of external data loss risk such as certain incidents such as shutdown of servers, natural disasters, and others. Access Nomination Threat: The access should be restricted under 10 people under one single active admin. Therefore, the threat should be mitigated with admin assistance to manage 10 people. Data Access Security Threat: Data access should be restricted under some appropriate domain control in order to control user view and their utilization of security plan (Miller Ager, 2013). The security plan can justify the use of secure access with precautions. References Miller, C., Ager, A. A. (2013). A review of recent advances in risk analysis for wildfire management.International journal of wildland fire,22(1), 1-14. Olivo, C. K., Santin, A. O., Oliveira, L. S. (2013). Obtaining the threat model for e-mail phishing.Applied soft computing,13(12), 4841-4848.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.