Explain difference between concepts of risk and uncertainty

Assignment Help Risk Management
Reference no: EM13840987

1. For this question you are required to make at least Four (4) forum postings concerning the following topic: Do you think the ''fear factor'', or FUD, is an appropriate strategy for increasing investment in security? You will be assessed on what you contribute to the debate in terms of quality not quantity (though your posting should at a minimum be a few sentences long). You may either create a new thread or reply to a previous posting. All new threads should contain the subject line 'FUD Debate'

2. Answer the following questions with reference to the case study below, which details the security layout of an airport (note: you only need to consider the departure process for this question, not the arrival process):

a. Use a diagram (with symbols like those in Inside the Security Mind, Fig.5.2) to describe the security layout below using a thinking in zones approach. The areas you need to classify as either untrusted, semitrusted or trusted are the main terminal area, the sterile area, and the apron. You should also indicate whether any filtering occurs between these zones, and the types of communication allowed. In doing so, you may have to extend the meaning of the communication symbols in Fig.5.2 so that they fit a human traffic scenario.

b. In each case, explain why you classified each area (the main terminal area, the sterile area, and the apron) as you did.

c. From your answers above, identify which area(s), if any, are high exposure, medium exposure, medium-low exposure, and low exposure.

d. Do you think the ''Thinking in Zones'' approach is equally applicable to an airport scenario as it is to a computer networking scenario? Why or why not?

Airport layout:

Airport details

• Anyone is permitted both to enter and leave the airport terminal at their discretion.

• Once inside the terminal, passengers check in at the airport counter to receive a boarding pass.

• To board a flight, passengers must first enter the airport's sterile area. To enter the sterile area, it is necessary to go through a security check. Once inside the sterile area, passengers are free to go back to the main terminal area (but they will need to undergo another security check to re-enter the sterile area).

• Passengers must move onto the airport apron to board their flight. In order to do this, it is necessary to have a boarding pass. A check is made at the flight gate to ensure passengers have a boarding pass.

• Once on the airport apron, passengers must board the plane. They are not permitted to re-enter any other part of the airport.

3. Explain what the author of Inside the Security Mind means by the following statement: 'As zoning functionality increases, exposure increases' (Day 2003, p.77). In addition, offer four practical examples in support of this statement.

4. When acquiring software from an external source (such as a web site), it is good practice to install and run it on a test machine that is isolated from any internal network. Use the -Thinking in Zones- approach described in the Day text to explain why this practice is recommended.(at least two recommendations)

5. You are asked to do a presentation on the topic of failing securely. Research the following concepts to be used as examples in your presentation. For each concept, prepare a brief description (at least two paragraphs) showing how it supports the concept of failing securely:

• The air-brake system on a railway carriage;

• The TTL count in a TCP/IP packet;

• A firewall access control list;

• A Java bytecode file that contains an arbitrary jump in the code that has been added by an attacker, and which points to a piece of viral code appended to the end of the file.

6. You download a piece of software (signed with a digital signature) from the Internet, and run it using the administrator account on your computer. Using Day's theory ofchained trusts explain any two ways why this is dangerous.

7. Explain the difference between the concepts of risk and uncertainty.

8. A risk manager evaluates whether or not to apply a countermeasure to control risk. The countermeasure may involve risk reduction, risk assignment, or risk acceptance. Briefly summarise these different approaches.

Reference no: EM13840987

Questions Cloud

Contract for pre-employment physicals : Currently the clinic does 250 visits per week, with 50% of all visits as return visits. Each employee (physician, nurse, and receptionist) is scheduled to work 35 hours per week. How many employees by type does the clinic currently need? How many emp..
Describe performance appraisal method : Can you explain/describe one performance appraisal method and explain an error that can occur in the performance appraisal process and one way to effectively deal with such an error.
Measuring customer satisfaction and focus groups : Measuring Customer Satisfaction and Focus Groups
Common feature of leadership research : Participative leadership is most likely to be effective in a culture with: Which statement about leadership development in organizations is least likely to be accurate: Which of the following is not characteristic of most leadership research? Which o..
Explain difference between concepts of risk and uncertainty : Explain the difference between the concepts of risk and uncertainty. A risk manager evaluates whether or not to apply a countermeasure to control risk.
Employee development strategy might have contributed : Discuss a time in your career when you felt like you were learning and growing and another time when you felt like you were not. In each case, discuss how your company’s employee development strategy might have contributed to your feelings.
Competitive strategy-strategies in diversified business : The two types of strategies in a diversified business are accurately described as? Ghemawat and Collis provide a six step process for mapping business landscapes including all of the following except? Identifying Groups of Players. Thinking Dynamical..
Research a company in the fast- or quick- food industries : Research a company in the fast- or quick- food industries
The role and importance of a project sponsor : the role and importance of a project sponsor

Reviews

Write a Review

Risk Management Questions & Answers

  For many years japanese financial companies including

for many years japanese financial companies including insurance companies banded assets together as a method of

  What is the appropriate hedging strategy

What is the appropriate hedging strategy using call options and what is the cash flow of the hedging strategy?

  Risk management and effective communication planning

Assignment: Risk Management and Effective Communication Planning, Imagine that you have been asked to participate as a project manager for a website renovation project for a clothing department store

  Risk management and compliance

RISK MANAGEMENT AND COMPLIANCE

  Explain financial management risk

You need to explain financial management risk to the new staff. Using the library and other credible sources, respond to the regarding factors of financial risk

  Discuss how the strategies are applied

Describe three that you think are the most important, and discuss how the strategies are applied and describe three that you think are the most important and discuss how the strategies are applied.

  Which aspects or areas of a project plan

Which aspects or areas of a project plan are more likely to be affected by risk responses? How do risk responses affect the different areas of a project plan? Give an example of a situation in which you believe a highly perceptible risk response plan..

  Cost of capital suppose a firm uses its company cost of

cost of capital suppose a firm uses its company cost of capital to evaluate all projects. will it underestimate or

  What are the five different approaches to risk

Supporting Activity: Two Information Trends, What are the five different approaches to risk? What are the pros and cons of each strategy? Support your answer with solid reasoning

  Identify risk management processes

Identify at least three of the six risk management processes and briefly describe each. Provide an example of how you would use each in a project

  Explain how network risk can be mitigated

Your manager has heard the term network risk management. He is not sure what it entails. Before you tell him what it is, you want to be certainly that you have all of the factors. Research network management and answer the following questions for ..

  Explain at least weaknesses in it security

Explain at least weaknesses in IT security and identify and explain at least three weaknesses not directly related to IT security

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd