Threat identification-risk management, Computer Network Security

Threat Identification

After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats facing organization. The realistic threats are required to be investigated further while the unimportant threats are set aside.

Examination of identify, prioritize threats and threat agents is called as threat assessment. Each thread can be addressed based on following few questions.

•    Which threats present danger to assets?
•    Which threats represent the danger to information?
•    How much would it cost to recover from the attack?
•    Which threat needs greatest expenditure to prevent?

Posted Date: 10/8/2012 6:16:25 AM | Location : United States







Related Discussions:- Threat identification-risk management, Assignment Help, Ask Question on Threat identification-risk management, Get Answer, Expert's Help, Threat identification-risk management Discussions

Write discussion on Threat identification-risk management
Your posts are moderated
Related Questions
how can you enter the ASVAB practice test on line?

Discuss how developers should apply the following countermeasures to improve the security of their code:

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi