Risk Analysis Lab Manual
Risk Analysis Lab Manual
Session 2024-25
Published by:
2024-25
© Copyright Reserved
Copying or facilitating copying of lab work comes under cheating and is considered as use of
unfair means. Students indulging in copying or facilitating copying shall be awarded zero marks
for that particular experiment. Frequent cases of copying may lead to disciplinary action.
Attendance in lab classes is mandatory.
Labs are open up to 7 PM upon request. Students are encouraged to make full use of labs beyond
normal lab hours.
Risk Analysis and Assessment| iii
2024-25
PREFACE
Risk Analysis and Assessment Lab Manual is designed to meet the course and program
requirements of NCU curriculum for B.Tech III year Cyber Security students of CSE branch.
The concept of the lab work is to give brief practical experience for basic lab skills to students. It
provides the space and scope for self-study so that students can come up with new and creative
ideas.
The Lab manual is written on the basis of “teach yourself pattern” and expected that students
who come with proper preparation should be able to perform the experiments without any
difficulty. Brief introduction to each experiment with information about self-study material is
provided. The laboratory case study will assist students to develop an understanding of the
fundamentals of risk management and to introduce classical as well as state-of-the-art risk
analysis techniques. Students will be able to perform risk assessment and determine mitigation
step for the same. Students are expected to come thoroughly prepared for the lab. General
disciplines, safety guidelines and report writing are also discussed.
The lab manual is a part of curriculum for the The NorthCap University, Gurugram. Teacher’s
copy of the experimental results and answer for the questions are available as sample guidelines.
We hope that lab manual would be useful to students of CSE and IT branches and author
requests the readers to kindly forward their suggestions / constructive criticism for further
improvement of the work book.
Author expresses deep gratitude to Members, Governing Body-NCU for encouragement and
motivation.
Authors
The NorthCap University
Gurugram, India
Risk Analysis and Assessment| iv
2024-25
CONTENTS
Page
S.N. Details No.
Syllabus
1 Introduction
2 Lab Requirement
3 General Instructions
4 List of Experiments
5 Rubrics
Risk Analysis and Assessment| v
2024-25
1. INTRODUCTION
2024-25
2. LAB REQUIREMENTS
Requirements Details
8 GB RAM (Recommended)
Required Bandwidth NA
Risk Analysis and Assessment| vii
2024-25
3. GENERAL INSTRUCTIONS
● Students must turn up in time and contact concerned faculty for the experiment they
are supposed to perform.
● Students will not be allowed to enter late in the lab.
● Students will not leave the class till the period is over.
● Students should come prepared for their experiment.
● Experimental results should be entered in the lab report format and certified/signed
by concerned faculty/ lab Instructor.
● Students must get the connection of the hardware setup verified before switching on
the power supply.
● Students should maintain silence while performing the experiments. If any necessity
arises for discussion amongst them, they should discuss with a very low pitch
without disturbing the adjacent groups.
● Violating the above code of conduct may attract disciplinary action.
● Damaging lab equipment or removing any component from the lab may invite
penalties and strict disciplinary action.
3.2 Attendance
● Attendance in the lab class is compulsory.
● Students should not attend a different lab group/section other than the one assigned
at the beginning of the session.
● On account of illness or some family problems, if a student misses his/her lab
classes, he/she may be assigned a different group to make up the losses in
consultation with the concerned faculty / lab instructor. Or he/she may work in the
lab during spare/extra hours to complete the experiment. No attendance will be
granted for such case.
Risk Analysis and Assessment| viii
2024-25
● Students should come to the lab thoroughly prepared on the experiments they are
assigned to perform on that day. Brief introduction to each experiment with
information about self-study reference is provided on LMS.
● Students must bring the lab report during each practical class with written records
of the last experiments performed complete in all respect.
● Each student is required to write a complete report of the experiment he has
performed and bring to lab class for evaluation in the next working lab. Sufficient
space in work book is provided for independent writing of theory, observation,
calculation and conclusion.
● Students should follow the Zero tolerance policy for copying / plagiarism. Zero
marks will be awarded if found copied. If caught further, it will lead to disciplinary
action.
● Refer Annexure 1 for Lab Report Format.
Risk Analysis and Assessment| ix
2024-25
4. LIST OF EXPERIMENTS
2024-25
5. RUBRICS
Marks Distribution
Risk Analysis and Assessment| xi
2024-25
Each Lab Assessment (30 marks) At the end of the semester viva will be
conducted related to the subject
Each lab experiment shall be evaluated for
knowledge and this component carries 20
10 marks for which breakup is:
marks.
6 Marks: Observation & conduct of
experiment. Teacher may ask questions
about experiment.
Semester: 6th
Group: CS1
EXPERIMENT NO. 1
Link to Code:
Date:
Faculty Signature:
Marks:
Objective(s):
Outcome:
Student will be familiarize with concepts of assets, threat and vulnerability and prepare report on it
Problem Statement:
1. A growing e-commerce company, ShopEasey, provides an online platform where customers can
browse and purchase a variety of products. The platform processes customer data, manages
inventory, and integrates with third-party payment gateways. Recently, ShopEasey experienced a
surge in failed login attempts and unusual traffic patterns, raising concerns about potential security
risks. The company's management wants to evaluate the platform’s threats, assets, and
vulnerabilities to improve security.
Identify assets, threats, and vulnerability
2. A modern, mid-sized hospital, HealthCare Plus, relies heavily on its Hospital Management System
(HMS) to manage patient records, appointments, billing, and medical equipment tracking. The
system integrates with various devices, including IoT-enabled medical devices, to monitor patient
vitals in real-time. Recently, there have been instances of system downtime and phishing attempts
targeting hospital staff. The hospital's management wants to evaluate its assets, threats, and
vulnerabilities to protect its sensitive data and critical operations.
Identify assets, threats, and vulnerability
Background Study:
Vulnerability assessment report contains three columns in excel file: - assets, vulnerability and threat.
Asset: anything that has value to the organization.
Risk Analysis and Assessment | 2
2024-25
Question Bank:
2.
Risk Analysis and Assessment | 4
2024-25
EXPERIMENT-2
● Understands the management requirement and formulate the requirement into high-level
statement.
● Formulate statement that are concise, brief , unambiguous and easy to understand
Outcome:
Policy is a high-level statement of requirements. A security policy is the primary way in which
management’s expectations for security are provided to the builders, installers, maintainers, and
users of an organization’s information systems.
A good security policy should be a high-level, brief, formalized statement of the security practices
that management expects employees and other stakeholders to follow.
Policy should contain:-purpose, scope, responsibility and content
Question Bank:
Purpose
The purpose of this policy is to establish guidelines for the effective and secure conduct of online
teaching and examinations. It aims to ensure academic integrity, compliance with institutional
standards, and a seamless learning experience for students and faculty.
Scope
Any third-party platforms or tools used for virtual learning and assessments.
Responsibilities
Review and update policies to align with technological advancements and institutional
needs.
4. Content
All online teaching must be conducted through officially approved platforms (e.g.,
Google Meet, Microsoft Teams, Zoom, or LMS).
Faculty and students must use secure login credentials and follow cybersecurity best
practices.
Course plans must be shared in advance, including schedules, assignments, and reading
materials.
Recorded lectures may be provided for academic reference, ensuring compliance with
privacy policies.
Students must actively engage in learning activities and discussions as per course
requirements.
Exams may include multiple-choice questions, case studies, open-book tests, or oral
assessments.
Students must verify their identity using institutional credentials (e.g., ID verification,
webcam authentication).
Violation of exam rules may lead to disciplinary actions, including disqualification or re-
examination.
Students must report technical difficulties immediately to the designated support team.
This policy will be reviewed annually or as required to adapt to new technologies and
institutional needs.
By adhering to this policy, the instruction aims to ensure a secure, fair and effective learning
environment for all students, whether online or offline.
Risk Analysis and Assessment | 9
2024-25
EXPERIMENT NO. 3
Student will be familiarizing with concepts of assets, threat and vulnerability and prepare report on it
Problem Statement:
Design Vulnerability Report on E-Commerce site
Background Study:
Vulnerability assessment report contains three columns in excel file:- assets, vulnerability and threat.
Asset: anything that has value to the organization.
Vulnerability: - A weakness of an asset that can be exploited by one or more threats.
Threat: any action or event with the potential to cause harm.
Question Bank:
EXPERIMENT NO. 4
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
Student will be familiarize with concepts of assets, threat and vulnerability and prepare report on it
Problem Statement:
Design Risk Assessment Report on NCU
Background Study:
Risk assessment report contains columns in excel file :- assets, vulnerability, threat, threat severity and
threat likelihood, Risk, type of Risk and Risk severity .
Asset: anything that has value to the organization.
Vulnerability:- A weakness of an asset that can be exploited by one or more threats.
Threat: any action or event with the potential to cause harm.
Risk=threat× Vulnerability on particular assets
Question Bank:
3. To estimate the level of risk from a particular type of security breach, three factors are considered:
threats, vulnerabilities, and impact. An agent with the potential to CAUSE a security breach. This could be
either a person or an environmental condition such as fire would be ……………
4.What are the difference between quantitative risk assessment and qualitative risk assessment?
Risk Analysis and Assessment | 12
2024-25
EXPERIMENT NO. 5
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
Question Bank:
1. How can we ensure comprehensive identification of both internal and external threats?
2. What tools or methods can be used to identify emerging or evolving threats effectively?
3. How do we prioritize identified threats based on their relevance to organizational
objectives?
Risk Analysis and Assessment | 14
2024-25
EXPERIMENT NO. 6
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
Student will be able to find out all the controls for the respective risk as well as recommends the
one of the specific controls to mitigate that respective risk.
Problem Statement:
You are managing a small software development project with a team of five developers. One of
your critical risks is that a key developer might unexpectedly leave the project.
Background Study:
Report contains columns in excel file:- assets, vulnerability, threat, threat severity and threat likelihood,
Risk, type of Risk , Risk severity, Control and Recommended Control .
Asset: anything that has value to the organization.
Vulnerability: - A weakness of an asset that can be exploited by one or more threats.
Threat: any action or event with the potential to cause harm.
Risk=threat× Vulnerability on particular assets.
Security controls categorised in the following areas:
• Logical controls (e.g. protection of data, protection of network assets, protection of access to
applications etc.)
• Physical controls (e.g. alarm systems, fire sensors, physical access control, surveillance etc.)
• Organisational controls (e.g. usage rules, administration procedures, process descriptions,
definition of roles etc.)
• Personnel controls (e.g. sanctions, confidentiality clauses in contracts, training and awareness etc.)
Question Bank:
Risk Analysis and Assessment | 16
2024-25
1.Mention Controls that can substitute for the loss of primary controls and mitigate risk down to an
acceptable level.
2. Which type of control protects transmitted data and information as well as stored data against
unauthorized disclosure?
3. How Least cost approach impacts the risk mitigation strategy decisions?
Risk Analysis and Assessment | 17
2024-25
EXPERIMENT NO. 7
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
Student will be able to find out all the controls for the respective risk as well as recommends the
one of the specific controls to mitigate that respective risk.
Problem Statement:
NCU relies heavily on an online learning management system (LMS) for managing classes,
assignments, and exams. A risk has been identified: the LMS server might go down during final
exams, disrupting the examination process.
Background Study:
Report contains columns in excel file:- assets, vulnerability, threat, threat severity and threat likelihood,
Risk, type of Risk , Risk severity, Control and Recommended Control .
Asset: anything that has value to the organization.
Vulnerability: - A weakness of an asset that can be exploited by one or more threats.
Threat: any action or event with the potential to cause harm.
Risk=threat× Vulnerability on particular assets.
Security controls categorised in the following areas:
• Logical controls (e.g. protection of data, protection of network assets, protection of access to
applications etc.)
• Physical controls (e.g. alarm systems, fire sensors, physical access control, surveillance etc.)
• Organisational controls (e.g. usage rules, administration procedures, process descriptions,
definition of roles etc.)
• Personnel controls (e.g. sanctions, confidentiality clauses in contracts, training and awareness etc.)
Risk Analysis and Assessment | 19
2024-25
Question Bank:
1. How do you prioritize risks for mitigation when resources are limited?
2. How can we balance the need for proactive mitigation with maintaining operational efficiency?
3. How do we ensure that mitigation strategies remain effective in a rapidly changing risk landscape?
Risk Analysis and Assessment | 20
2024-25
EXPERIMENT-8
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
Student will be able to find out residual risk and prepare overall summary of risk management.
Problem Statement:
Risk treatment and risk communication on risk assessment report of NCU.
Background Study:
Report contains columns in excel file :- assets, vulnerability, threat, threat severity and threat likelihood,
Risk, type of Risk , Risk severity, Control , Recommended Control and Residual Risk.
Asset: anything that has value to the organization.
Vulnerability:- A weakness of an asset that can be exploited by one or more threats.
Threat: any action or event with the potential to cause harm.
Risk=threat× Vulnerability on particular assets.
Options of risk treatment:- mitigation ,transfer ,avoidance and retention of risks
Question Bank:
EXPERIMENT NO. 9
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
Student will be able to find out residual risk and prepare overall summary of risk management.
Problem Statement:
Design ISO audit report on NCU.
Background Study:
Report contains columns in excel file:- assets, vulnerability, threat, threat severity and threat likelihood,
Risk, type of Risk , Risk severity, Control , Recommended Control and Residual Risk.
Asset: anything that has value to the organization.
Vulnerability: - A weakness of an asset that can be exploited by one or more threats.
Threat: any action or event with the potential to cause harm.
Risk=threat× Vulnerability on particular assets.
Options of risk treatment: - mitigation, transfer ,avoidance and retention of risks
Question Bank:
1.What is ISMS?
2. What are the difference between security and privacy?
3. What are the key benefits of ISO27001?
4.What do you mean by incident Management?
Risk Analysis and Assessment | 24
2024-25
EXPERIMENT NO. 10
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To assess the governance and management of IT during the implementation of a new Student
Information System (SIS) at a university, using the COBIT framework. This audit aims to ensure
effective alignment of IT goals with institutional objectives, risk mitigation, and optimized resource
utilization.
Outcome:
Student will be able to evaluate the alignment of IT processes with business goals, identify gaps in
controls, and recommend improvements to enhance compliance, security, and operational
efficiency..
Problem Statement:
Conduct an Audit using the COBIT framework for a given scenario in university. The university is
implementing a new Student Information System (SIS) to manage admissions, course registrations,
grades, and student records. The audit will assess the governance and management of IT during this
implementation.
Background Study:
The Control Objectives for Information and Related Technology (COBIT) framework is a globally
recognized framework for managing and governing enterprise IT. It provides a comprehensive set
of practices, tools, and metrics designed to help organizations align IT strategies with business
objectives.
Question Bank:
1. How does the university ensure alignment between SIS project goals and institutional
objectives?
2. What mechanisms are in place to evaluate and manage stakeholder expectations regarding
the SIS implementation?
3. How does the university’s governing body oversee IT investments related to the SIS?
4. How are human, financial, and technical resources allocated and managed for the SIS
project?
5. What KPIs are used to monitor IT performance related to the SIS?
Risk Analysis and Assessment | 27
2024-25
EXPERIMENT NO. 11
Semester /Section:
Link to Code:
Date:
Faculty Signature:
Marks:
Objective:
To analyze a real-world cybersecurity incident, identify the challenges faced during the response
phase, and provide insights into how such incidents can be better managed in the future
Outcome:
Student will be able to deliver a comprehensive summary of the cybersecurity incident, highlighting
the key challenges encountered during response efforts. It will also provide recommendations to
enhance incident response planning and execution.
Problem Statement:
Study a real-world cyber security incident and summarize the challenges faced during response.
Background Study:
Nature of the Attack: Understanding the type (e.g., ransomware, phishing, denial of
service) and scope of the attack.
Challenges During Response: Identifying issues like delayed detection, lack of
coordination, insufficient resources, and communication gaps.
Mitigation Measures: Exploring how organizations address vulnerabilities and recover
from the attack.
By studying real-world incidents, we can extract lessons to bolster future defenses and responses.
Risk Analysis and Assessment | 29
2024-25
Question Bank: