Listing assets in order of importance-risk management, Computer Network Security

Listing Assets in Order of Importance

Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated using weighted factor analysis. The assets in order of importance are listed using a weighted factor analysis worksheet.

In following Table given below, the scores range from 0.1 to1.0, which is recommended by NIST.

 Accessing Risks

 Controlling Risks


                   2494_Listing Assets in Order of Importance-risk management.png

Posted Date: 10/8/2012 6:10:20 AM | Location : United States

Related Discussions:- Listing assets in order of importance-risk management, Assignment Help, Ask Question on Listing assets in order of importance-risk management, Get Answer, Expert's Help, Listing assets in order of importance-risk management Discussions

Write discussion on Listing assets in order of importance-risk management
Your posts are moderated
Related Questions
Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

QUESTION : a) A datagram of 3000 bytes has to travel over a network with a MTU size of 1000 bytes. Describe how fragmentation can be used to solve this problem. You should pr

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

PACKETS: Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.  FRAME: A hardware frame or

Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Normal 0 false false false EN-US X-NONE X-NONE

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di