Reference no: EM131183899
1) You have just completed a qualitative threat assessment of the computer security of your organization, with the impacts and probabilities of occurrence listed in the table that follows. Properly place the threats in a 3-by-3 table. Which of the threats should you take action on, which should you monitor, and which ones may not need your immediate attention?
Threat Impact Probability of Occurrence
Virus attacks High High
Internet hacks Medium High
Disgruntled employee hacks High Medium
Weak incidence response mechanisms Medium Medium
Theft of information by a trusted third-party contractor Low Medium
Competitor hacks High Low
Inadvertent release of noncritical information Low Low
2) You have been asked by management to secure the laptop computer of an individual who was just dismissed from the company under unfavorable circumstances. Pretend that your own computer is the laptop that has been secured. Make the first entry in your log book and describe how you would start his incident off correctly by properly protecting and securing the evidence.
Provide recommendations for mechanisms
: Provide recommendations for mechanisms that can be applied to reduce the spread and impact of each. How would you integrate and incorporate those mechanisms into an existing network environment?
|
Strategies the retailers follow to target customers
: Local contractors, home remodelers, and other small-business customers are buying the products they require for the day's projects.- Describe particular strategies these retailers could follow to target and serve these customers.
|
Amount of dissolved oxygen
: How does water turbidity affect the amount of dissolved oxygen?
|
Which is not a component part of total customer value
: Which of the following is NOT a component part of total customer value? Data published by the government and data purchased fromout side suppliers can improve the quality of a company's marketing intelligence efforts
|
Which ones may not need your immediate attention
: Pretend that your own computer is the laptop that has been secured. Make the first entry in your log book and describe how you would start his incident off correctly by properly protecting and securing the evidence.
|
Find the probability distribution for x
: A random variable X is defined to be the larger of the two values when two dice are thrown, or the value if the values are the same. Find the probability distribution for X.
|
Fermentation of glucose
: The fermentation of glucose (C6H12O6) produces ethyl alcohol (C2H5OH) and CO2: C6H12O6(aq) → 2 C2H5OH(aq) + 2 CO2(g)
|
What is the total potential
: If connected such that one cell acts as a battery to power the other as an electrolytic cell, which two metals are plated, and what is the total potential? (Al,Ag,Zn,Ni) c) If 3.70 g of metal is plated in the voltaic cell, how much metal is plated..
|
The factors that impact on consumers decision making process
: Identify and discuss the four factors that may impact on a consumer decision-making process to buy your selected brand of a product/service?
|