Insider Threads (Unauthorized access to system – Misuse privilege - Blackmail - Browsing of proprietary information - Computer abuse, corrupted data Malicious code (e.g., virus, logic bomb, Trojan horse) Intrusion on personal privacy
Risk Description
Work disruption or data loss, which affects productivity and security.
Existing Controls
Firewall, Traditional Antivirus and Basic Control
Risk Mitigation Policy
- Enable Firewall Policy.
- Enable EDR system
- Enable IDS/IPS
- Enable Security Group Policy in Active Directory
- Perform regular maintenance to prevent issues.
- Access Control: Limit device access and services to authorized users.
- Keep backups of important data.
- Monitoring: Track device performance to spot problems early.
Location/Contact Person details
The chairman of risk management sub-committee in UTAS-SUR
Dr.Sami Al-Batashi, Phone: +968 9293 9604
Email: sami.albattashi@utas.edu.om
Risk Management Authority
Risk Management Committee in UTAS-SUR
Risk Likelihood
Medium
Risk Impact
High
Risk Level
Medium
Risk Incident Response Procedures
- Isolate the affected device or user to prevent further damage or misuse.
- Fix the issue by repairing or replacing the device or addressing misuse or reimaging the system
- Restore normal operations, ensuring all data is safe and systems are functioning.
Risk Termination
By sending the final report explaining the problem causes and how we can mitigate next time.