Threat identification-risk management, Computer Network Security

Threat Identification

After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats facing organization. The realistic threats are required to be investigated further while the unimportant threats are set aside.

Examination of identify, prioritize threats and threat agents is called as threat assessment. Each thread can be addressed based on following few questions.

•    Which threats present danger to assets?
•    Which threats represent the danger to information?
•    How much would it cost to recover from the attack?
•    Which threat needs greatest expenditure to prevent?

Posted Date: 10/8/2012 6:16:25 AM | Location : United States







Related Discussions:- Threat identification-risk management, Assignment Help, Ask Question on Threat identification-risk management, Get Answer, Expert's Help, Threat identification-risk management Discussions

Write discussion on Threat identification-risk management
Your posts are moderated
Related Questions
Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem


Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

what is computer network?