Explain the impact if the attack or threat was actualized

Assignment Help Management Information Sys
Reference no: EM131556695

Discussion

let's start by each identifying one of the following:

1. Asset identification: Identify what might be a personal or business asset (think of something you have at home that you would like to protect, or something that your company has that needs protection).

2. Attacker/threat identification: Who are the likely attackers to that asset? What other threats are there that can negatively impact that asset? Remember that an attacker is always a person with intent, and is only one type of threat - we also have natural disasters, accidents, etc. that are not "attacks" as they don't have malicious intent behind them.

3. Impact: Identify the impact if the attack or threat was "actualized" (happened). Would there be a monetary loss? Loss of confidence (in the event of a business breach)? Fine (in the event of a loss of PII or PHI)?

4. Remediation: Research and recommend a security control (i.e. firewall, lock on a door, etc.) that can remediate (prevent, detect, correct, etc.) the attack or threat.

Remember to follow up by appropriately responding to another learner. Try not to repeat someone else's reponse!!

Reference no: EM131556695

Questions Cloud

Which will provide the program user some basic information : DisplayApplicationInformation, which will provide the program user some basic information about the program.
Find size of monthly payments paul will be required to make : PERSONAL LOANS Two years ago, Paul borrowed $10,000 from his sister Gerri to start a business. Paul agreed to pay Gerri interest for the loan at the rate.
Discuss the technological changes : Using a Microsoft Word document, please assume you are a reporter writing ten years hence. Please discuss the technological changes.
How much cash can josh muster for his business : REFINANCING A HOME Josh purchased a condominium 5 yr ago for $180,000. He made a down payment of 20% and financed the balance with a 30-yr conventional.
Explain the impact if the attack or threat was actualized : Explain the impact if the attack or threat was actualized (happened). Would there be a monetary loss? Loss of confidence (in the event of a business breach).
Explain the process to identify consumer attributes : Explain the process to identify consumer attributes for markets or market segments from market profiles or from the organisations existing customer data.
Compare the six core processes in the sdlc : Compare the six core processes in the SDLC. Give your opinion on which one you believe is the least important in developing software, and explain why.
Productive sense of purpose and mission : How effective are the prevailing symbols and actions in fostering group cohesion and a productive sense of purpose and mission?
What is the outstanding principal on kim house now : FINANCING A HOME Eight years ago, Kim secured a bank loan of $180,000 to help finance the purchase of a house. The mortgage was for a term of 30 yr.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss the future of the cloud in terms of free services

Elasticity is a key characteristic of the cloud computing model. Create a scenario where a company that offers cloud on-demand solutions would benefit from scaling its resources. Determine the types of metrics you would consider when scaling your ..

  The security of corporate information

What impact do these have on the security of corporate information?  What steps does the corporation take to ensure its intellectual property is intact? What about client information?

  Examine risks of going global with an e-commerce business

Compare the major advantages and disadvantages of starting an e-commerce business versus a traditional brick-and-mortar business. Examine the significant risks of going global with an e-Commerce business.

  Efficient supply chain managementhow is supply chain

efficient supply chain managementhow is supply chain management important for companies that are trying to get a

  Perform a dea evaluation for this set of units

Perform a DEA evaluation for this set of units, listing the efficiency and the virtual outputs for each of restaurants.

  Why a disaster recovery plan is necessary even for brick

Explain how a business can analyze the return on investment of a disaster recovery plan. Be careful not to overinflate numbers to use as a negotiation tool with finance folks in a business, and be sure to include numbers that financial managers ma..

  Examine the structured analysis and design technique

Examine the Structured Analysis and Design Technique (SADT) diagrams that were used to document the reengineered parts of the exam scheduling and distribution process

  Cameron balloons simulationyoull remember that were using a

cameron balloons simulationyoull remember that were using a common basic format for most of the project assignments in

  What is the smallest processing rate per hour

A business school is considering replacing its copy machine with a faster model.- What is the smallest processing rate per hour that can be considered?

  Step-wise answer to supply chain management700-1050-word

step-wise answer to supply chain management700-1050-word paper in which you outline the supply chain of your

  Define business processes and activities

How can information technology support a company's business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer.

  Why should continuity plans be tested and rehearsed

List the seven-step CP process as defined by the NIST. What is the recommended standard approach to the process? List and describe the three criteria used to determine whether an actual incident is occurring.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd