Documenting the results of risk assessment, Computer Network Security

Documenting the Results of Risk Assessment

The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The final summarized is ranked vulnerability risk worksheet.

The worksheet details are organized as asset, vulnerability, asset impact, and vulnerability possibility and risk rating factor. The ranked vulnerability risk is the initial working document for next step in risk management process: assessing and controlling the risk.
The Table given below shows a sample list of the worksheets

 

             2227_Documenting the Results of Risk Assessment.png

Posted Date: 10/8/2012 6:44:15 AM | Location : United States







Related Discussions:- Documenting the results of risk assessment, Assignment Help, Ask Question on Documenting the results of risk assessment, Get Answer, Expert's Help, Documenting the results of risk assessment Discussions

Write discussion on Documenting the results of risk assessment
Your posts are moderated
Related Questions
QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

how to link html with a data base

Need Assignemnt help in Information security assignemnt

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

Discuss the risks of having a single root user

ARP MESSAGE FORMAT Although the ARP data packet format is sufficiently general to allow hardware addresses and arbitrary protocol. ARP is almost usually used to bind a 32-bit

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection: