Listing assets in order of importance-risk management, Computer Network Security

Listing Assets in Order of Importance

Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated using weighted factor analysis. The assets in order of importance are listed using a weighted factor analysis worksheet.

In following Table given below, the scores range from 0.1 to1.0, which is recommended by NIST.

 Accessing Risks

 Controlling Risks

 

                   2494_Listing Assets in Order of Importance-risk management.png

Posted Date: 10/8/2012 6:10:20 AM | Location : United States







Related Discussions:- Listing assets in order of importance-risk management, Assignment Help, Ask Question on Listing assets in order of importance-risk management, Get Answer, Expert's Help, Listing assets in order of importance-risk management Discussions

Write discussion on Listing assets in order of importance-risk management
Your posts are moderated
Related Questions
VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

on LAN,where are IP datagrams transported?

briefly expslain type of e-commerce

PROCESSING AN INCOMING ARP MESSAGE When an ARP message reaches, the protocol specifies that the receiver must operate two basic steps. First the receiver finds the sender's add

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you

Question : (a) State whether the following statement is FALSE or TRUE: It is always better to have various access points to the Internet so that if a hacker takes one down you

Data units at different layers of the TCP/ IP protocol suite The data unit prepared at the application layer is known a message, at the transport layer the data unit build is