Documenting the results of risk assessment, Computer Network Security

Documenting the Results of Risk Assessment

The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The final summarized is ranked vulnerability risk worksheet.

The worksheet details are organized as asset, vulnerability, asset impact, and vulnerability possibility and risk rating factor. The ranked vulnerability risk is the initial working document for next step in risk management process: assessing and controlling the risk.
The Table given below shows a sample list of the worksheets

 

             2227_Documenting the Results of Risk Assessment.png

Posted Date: 10/8/2012 6:44:15 AM | Location : United States







Related Discussions:- Documenting the results of risk assessment, Assignment Help, Ask Question on Documenting the results of risk assessment, Get Answer, Expert's Help, Documenting the results of risk assessment Discussions

Write discussion on Documenting the results of risk assessment
Your posts are moderated
Related Questions
Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo


Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

Question (a) Draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connected. (b) State 3 main differences between a router