Threat identification-risk management, Computer Network Security

Threat Identification

After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats facing organization. The realistic threats are required to be investigated further while the unimportant threats are set aside.

Examination of identify, prioritize threats and threat agents is called as threat assessment. Each thread can be addressed based on following few questions.

•    Which threats present danger to assets?
•    Which threats represent the danger to information?
•    How much would it cost to recover from the attack?
•    Which threat needs greatest expenditure to prevent?

Posted Date: 10/8/2012 6:16:25 AM | Location : United States







Related Discussions:- Threat identification-risk management, Assignment Help, Ask Question on Threat identification-risk management, Get Answer, Expert's Help, Threat identification-risk management Discussions

Write discussion on Threat identification-risk management
Your posts are moderated
Related Questions
REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

(a) (i) Bob has public RSA key (n = 77, e = 7). Show that Bob's private key is (d = 43). (ii) Alice wants to send the message m = 13 to Bob. She encrypts the message usi

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

How safe is the encryption of virtual private networks?

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)