Management Decision Problem

Risk Assessment: Analyzing Security Vulnerabilities

1 .       A survey of your firm's information technology infrastructure has produced the following security analysis statistics:

Security Vulnerabilities by Type of Computing Platform

Platform Number of Computers High Risk Medium Risk Low Risk TotalVulnerabilities
Windows Server 2003 (corporate applications) 1 11 37 19  
Windows XP Professional (high-level administrators) 3 56 242 87  
Linux (e-mail and printing services) 1 3 154 98  
Sun Solaris (Unix) (E-commerce and Web servers) 2 12 299 78  
Windows XP Professional User desktops and laptops with office productivity tools that can also be linked to the corporate network running corporate applications and intranet 195 14 16 1237  

High risk vulnerabilities include non-authorized users accessing applications, guessable passwords, user name matching the password, active user accounts with missing passwords, and the existence of unauthorized programs in application systems.

Medium risk vulnerabilities include the ability of users to shut down the system without being logged on, passwords and screen saver settings that were not established for PCs, and outdated versions of software still being stored on hard drives.

Low risk vulnerabilities include the inability of users to change their passwords, user passwords that have not been changed periodically, and passwords that were smaller than the minimum size specified by the company.

  1. Calculate the total number of vulnerabilities for each platform. What is the potential impact of the security problems for each computing platform on the organization?
  2. If you only have one information systems specialist in charge of security, which platforms should you address first in trying to eliminate these vulnerabilities? Second? Third? Last? Why?
  3. Identify the types of control problems illustrated by these vulnerabilities and explain the measures that should be taken to solve them.
  4. What does your firm risk by ignoring the security vulnerabilities identified?