Unauthorized System and Network Access.
Risk Description
Unauthorized access to systems, programs or databases
Existing Controls
Basic Control
Risk Mitigation Policy
- Availability of safety and security measures for information
- Develop information security procedures and policies subject to international standards and best practices that set entry procedures and policies
- Raise awareness of information security and save passwords
- Conducting periodic tests to check the possibility of entry of unauthorized person
- Enable Network Access Control (NAC) services
- Make sure the network administrator can monitor all of the network traffic and activities.
- Collect Infrastructure logs in the SIEM system to analyze and detect any suspect activities.
Location/Contact Person details
The chairman of risk management sub-committee in UTAS-SUR
Dr.Sami Al-Batashi, Phone: +968 9293 9604
Email: sami.albattashi@utas.edu.om
Risk Management Authority
Risk Management Committee in UTAS-SUR
Risk Likelihood
High
Risk Impact
High
Risk Level
High
Risk Incident Response Procedures
- Minimize breach impact by isolating affected systems and securing unaffected ones.
- Temporarily suspend the account or change the password
- Prepare the appropriate security team based on the type of breach, whether in network or supporting systems.
- Investigate the breach to identify its causes, assess the damage, and develop alternative solutions.
- Resolve issues and implement measures to prevent future hacks.
- Send a report detailing the breach, its damage, solutions, and provide education to users and employees.
Risk Termination
By sending the final report explained the problem causes and how we can mitigate next times.