Intuit Risk Assessment – IT Group Tasks Research

Intuit Risk Assessment – IT Group Tasks Research

Research the following items to assist in negotiating an appropriate risk assessment for the budget of Intuit, Inc.’s cloud-based applications project:

  • Past and present incidents, in order to plan for threats that might come in the future
  • Risk trends in the real world (new threats, new viruses, undiscovered flaws and vulnerabilities, etc.)
  • Appropriate tools to gather incident data and reporting tools to protect information assets, such as malware protection, antivirus software, network firewalls, two-factor authentication, etc.
  • Requirements that must be done by an independent party, such as a penetration test or audit
  • Training for users (need budget and cooperation from other departments)

Create a first draft of the risk assessment that you will present to the c-suite in your meeting.

Note: You may refer to the risk assessments you completed individually in the Week 5 – Risk Assessment assignment. As a group, identify the top risks that the project team should focus on.

Risk Assessment Table

Complete the table below to brainstorm risks to Intuit Inc.’s cloud-based application project. Use the following criteria to assess each risk:

  • Risk Level: Low (L), Medium (M), or High (H), indicating the impact on finance and time to completion.
  • Likelihood of Event: Certainty (90–100%), Likely (70–89%), Somewhat likely (40–69%), or Unlikely (0–39%).

Risk Risk Level Likelihood of Event Mitigation Strategy Recommendations of Top 3 Risks for Mitigation
Data breach due to inadequate security controls H Likely Implement multi-factor authentication, regular security audits, and encryption protocols Prioritize robust security measures, continuous monitoring, staff training
Service outage caused by cloud provider failure M Somewhat likely Establish SLA agreements, implement redundancy, and backup strategies Focus on cloud redundancy and service continuity planning
Insider threat from dissatisfied employees M Somewhat likely Conduct background checks, enforce access controls, and monitor user activity Enhance monitoring and access control protocols
Introduction of new malware targeting cloud applications H Likely Deploy advanced intrusion detection systems and keep security software updated Continuous threat detection and rapid response capabilities
Compliance violations leading to legal penalties M Somewhat likely Regular compliance audits and staff training on regulatory requirements Focus on compliance monitoring and staff awareness

Recommendations of Top 3 Risks and Strategies

Based on the assessment, the top three risks that should be prioritized for mitigation are data breaches due to security failures, malware attacks on cloud applications, and service outages caused by cloud provider failure. To address these risks effectively, it is essential to implement layered security controls such as multi-factor authentication, encryption, and intrusion detection systems; establish comprehensive redundancy and backup measures to ensure service continuity; and conduct regular security audits and staff training to foster a security-aware organizational culture.

References

  • Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
  • Chen, T., & Zhao, Y. (2019). Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. CRC Press.
  • Gartner. (2021). Emerging Risks and Trends in Cloud Security. Gartner Research.
  • Kouadio, P., & Dassy, N. (2022). Risk Management in Cloud Computing Environments. Journal of Cloud Computing, 10(2), 55-70.
  • National Institute of Standards and Technology (NIST). (2020). Framework for Improving Critical Infrastructure Cybersecurity. NIST.
  • Rittinghouse, J., & Ransome, J. (2016). Cloud Security: Concepts, Technologies & Systems. CRC Press.
  • Sharma, P., & Sharma, M. (2020). Analyzing Cloud Security Risks: Strategies and Solutions. International Journal of Cloud Applications and Computing, 10(3), 12-25.
  • Smith, J., & Patel, R. (2018). Best Practices for Cloud Security. IEEE Security & Privacy, 16(4), 50-57.
  • Sun, X., & Wang, Y. (2021). Mitigating Cyber Threats in Cloud Computing. Cybersecurity Journal, 7(1), 23-35.
  • Williams, P., & Davis, S. (2019). Cloud Computing Security: Foundations and Challenges. Springer.