Listing assets in order of importance-risk management, Computer Network Security

Listing Assets in Order of Importance

Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated using weighted factor analysis. The assets in order of importance are listed using a weighted factor analysis worksheet.

In following Table given below, the scores range from 0.1 to1.0, which is recommended by NIST.

 Accessing Risks

 Controlling Risks

 

                   2494_Listing Assets in Order of Importance-risk management.png

Posted Date: 10/8/2012 6:10:20 AM | Location : United States







Related Discussions:- Listing assets in order of importance-risk management, Assignment Help, Ask Question on Listing assets in order of importance-risk management, Get Answer, Expert's Help, Listing assets in order of importance-risk management Discussions

Write discussion on Listing assets in order of importance-risk management
Your posts are moderated
Related Questions
BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

Ask question #Minimum 100 words acceptwwwed#

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Question requires you to submit a proposal based on the research report topic you will be addressing in the second assignment.  Note:  before commencing research on the topic, y

a) determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Assume a one-way propagati

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interac

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The