Threat identification-risk management, Computer Network Security

Threat Identification

After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats facing organization. The realistic threats are required to be investigated further while the unimportant threats are set aside.

Examination of identify, prioritize threats and threat agents is called as threat assessment. Each thread can be addressed based on following few questions.

•    Which threats present danger to assets?
•    Which threats represent the danger to information?
•    How much would it cost to recover from the attack?
•    Which threat needs greatest expenditure to prevent?

Posted Date: 10/8/2012 6:16:25 AM | Location : United States

Related Discussions:- Threat identification-risk management, Assignment Help, Ask Question on Threat identification-risk management, Get Answer, Expert's Help, Threat identification-risk management Discussions

Write discussion on Threat identification-risk management
Your posts are moderated
Related Questions
PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems

GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

SDES encryption and decryption

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca