Skip to content

Risk assessment report analyzing Instagram's security measures, vulnerabilities, and risk mitigation strategies. Includes information classification, IT security plans, implementation steps, and security awareness training to enhance platform safety.

Notifications You must be signed in to change notification settings

amssidds/Course-Project-Risk-Assessment-Report

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Instagram Risk Assessment Project

This project focuses on assessing the security risks associated with Instagram, a social networking platform used by millions worldwide. The report covers the security strategies, policies, and risk mitigation plans Instagram employs to safeguard its users' data and ensure the platform remains secure.

Table of Contents

Introduction

Instagram is a widely used social networking service that allows users to share photos and videos. Due to its vast infrastructure and global user base, it faces various security threats that require advanced risk management strategies.

Purpose

This project aims to conduct a risk assessment of Instagram, identifying potential vulnerabilities and threats while evaluating the platform's security controls and policies.

Objectives

  • Analyze Instagram's security measures.
  • Classify its assets and information based on confidentiality and impact levels.
  • Develop strategies to mitigate vulnerabilities and risks.

Strategies

Instagram has employed numerous strategies to ensure its platform is secure. These include providing bug-free software for both iOS and Android, offering high-definition media sharing, and maintaining business-friendly features.

Security Policies

Instagram implements strict security policies, including two-factor authentication, email verification, and account monitoring for suspicious activities. The platform also encourages users to report potential threats.

Information Classification

Information on Instagram is categorized based on its sensitivity, with confidential data like user security activities and credit card details being prioritized for protection.

Asset Classification

Key assets, such as user data and authentication databases, are protected through firewalls, encryption, and regular backups. Intrusion detection systems and biometric scans further strengthen security.

Risk Assessment

We analyzed several potential risks, such as SQL Injection attacks, DDoS attacks, system overheating, and physical security breaches. For each risk, we identified the vulnerability, asset, impact, and likelihood to calculate the overall risk level.

IT Security Plan

The IT Security Plan includes regular system logging, frequent backups, access control enforcement, monthly risk assessments, employee training, and regular security patches.

Implementation Plan

We outlined the specific implementation steps to mitigate risks such as SQL Injection attacks, DDoS attacks, and phishing emails.

Training and Security Awareness

A comprehensive training plan includes campaigns, posters, awareness presentations, leaflets, newsletters, meetings, and quizzes to keep employees informed of security threats and best practices.

Security Configuration

Regular security updates, vulnerability checks, and system re-assessments are conducted to ensure Instagram's infrastructure remains secure.

Lessons Learned

This project emphasized the importance of continuous risk management, especially for growing platforms like Instagram. Keeping up with emerging threats and updating security policies accordingly is essential to protect both users and the company.

Contributors

  • Ameen Murtaza Siddiqui
  • Khalifa Khaled Almansoori

About

Risk assessment report analyzing Instagram's security measures, vulnerabilities, and risk mitigation strategies. Includes information classification, IT security plans, implementation steps, and security awareness training to enhance platform safety.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published