Listing assets in order of importance-risk management, Computer Network Security

Listing Assets in Order of Importance

Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated using weighted factor analysis. The assets in order of importance are listed using a weighted factor analysis worksheet.

In following Table given below, the scores range from 0.1 to1.0, which is recommended by NIST.

 Accessing Risks

 Controlling Risks

 

                   2494_Listing Assets in Order of Importance-risk management.png

Posted Date: 10/8/2012 6:10:20 AM | Location : United States







Related Discussions:- Listing assets in order of importance-risk management, Assignment Help, Ask Question on Listing assets in order of importance-risk management, Get Answer, Expert's Help, Listing assets in order of importance-risk management Discussions

Write discussion on Listing assets in order of importance-risk management
Your posts are moderated
Related Questions
Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

every time i connect to WIFI the UC goes directly to 100% then i doesn''t want to come down. what shall i do ?

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern


Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these