
- •Final report
- •I. Executive Summary II. Recommendations
- •1.1 Operational Environment and System Configuration
- •1.1.1 The Risk Assessment Team
- •1.1.2 Organization Details of SpecOrg
- •1.1.3 Physical Plant and Physical Security
- •1.1.4 System Configuration
- •1.2 Terms and Definitions
- •Introduction 13
- •1.3 Risk Analysis Methodology
- •1.4 RiskWatch Parameters and Data Analysis
- •I. Executive Summary
- •Executive Summary 2
- •2.1 Summary of asset categories
- •2.2 Assets within category
- •II. Recommendations
- •5.2.1 Physical Access Control
- •5.2.4 Contract Specifications
- •5.2.7 Life Cycle Management
- •5.2.9 Personnel Clearances
- •5.2.12 Risk Analysis
- •5.1 Summary of safeguards
- •Initial costs
- •5 Others (16.0%)
2.1 Summary of asset categories
The following table provides a summary of the total replacement costs for each of the asset categories considered in the analysis.
Asset Category Replacement Cost Percentage of Total
-
Accounts Receivable
$50,000.
20.8%
Applications
$50,000.
20.8%
Communications Hardware
$50,000.
20.8%
Communications Software
$25,000.
10.4%
Hardware
$25,000.
10.4%
Office Equipment
$12,500.
5.2%
Documentation
$10,000.
4.2%
Databases
$7,500.
3.1%
System Software
$7,500.
3.1%
Personnel
$2,000.
0.8%
Accounts Payable
$1,337.
0.6%
Utilities
$0.
0.0%
FIGURE 4
This information is presented below as a barchart.
5 10 15 20 25 30 35 40 45 50 (x 1 ,000)
Dollars
FIGURE 5
The percentage of the total replacement cost for each category is indicated in the following diagram.
Asset Summary 2

Acct s Rec (20.8%)
Applicatns (20.8%)
FIGURE 6
Vulnerability
VULNERABILITY AREA REPORT
OVERALL COMPLIANCE:

Non-Compliance (98.6%)
VULNERABILITY AREA: Access Control

Non-Compliance (94.7%)
VULNERABILITY AREA: Accountability
There is 100% non-compliance in this area of vulnerability.
VULNERABILITY AREA: Administration
There is 100% non-compliance in this area of vulnerability.
VULNERABILITY AREA: Data Integrity
There is 100% non-compliance in this area of vulnerability.
VULNERABILITY AREA: Disclosure
There is 100% non-compliance in this area of vulnerability.
VULNERABILITY AREA: Documentation
There is 100% non-compliance in this area of vulnerability.
VULNERABILITY AREA: Evaluation
There is 100% non-compliance in this area of vulnerability.
VULNERABILITY AREA: Policy
There is 100% non-compliance in this area of vulnerability.
VULNERABILITY AREA: Privacy Act
There is 100% non-compliance in this area of vulnerability.
VULNERABILITY AREA: Reliability
Vulnerability Report 2
There is 100% non-compliance in this area of vulnerability.