Skip to content

favour090ike/ZenithTech-RiskAssessment

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

ZenithTech Risk Assessment: Threat Scenario R-001

Project Overview

This project demonstrates a quantitative approach to managing high-impact cyber threats. I conducted a risk analysis of a destructive malware attack targeting developer infrastructure and proposed a technical mitigation strategy to protect business continuity.

The Scenario

Threat: A hacker gains unauthorized access to a developer's workstation and executes a script to wipe the entire system. Inherent Risk Score: 15/25 (High)

Mitigation Strategy

To move the risk from High to Low, I implemented a triple-layer defense:

  1. MFA (Preventive): Stops unauthorized access at the front door.
  2. EDR (Detective): Kills malicious "wiper" processes in real-time.
  3. Cloud Backups (Recovery): Ensures zero data loss even if a system is wiped.

HEAT MAP

How to read the heat map

  1. The Red Dot: This is the "Inherent Risk." It shows that without your plan, the risk is in the "Danger Zone" (High Impact/Moderate Likelihood).
  2. The Arrow: This represents your security strategy. It shows the risk being "pushed" down into the Green Zone.
  3. The Green Dot: This is the "Residual Risk"—where the risk sits after you’ve implemented MFA, EDR, and Backups.

About

Quantitative Risk Assessment (QRA) for ZenithTech. Includes identification of high-impact threats (system-wiping malware), risk scoring based on likelihood and impact, and the implementation of mitigation controls (MFA, EDR, and Recovery) to reduce residual risk."

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors