Identify the impact if the attack or threat was actualized

Assignment Help Management Information Sys
Reference no: EM131553918

Assignment

1. Asset identification: Identify what might be a personal or business asset (think of something you have at home that you would like to protect, or something that your company has that needs protection).

2. Attacker/threat identification: Who are the likely attackers to that asset? What other threats are there that can negatively impact that asset? Remember that an attacker is always a person with intent, and is only one type of threat - we also have natural disasters, accidents, etc. that are not "attacks" as they don't have malicious intent behind them.

3. Impact: Identify the impact if the attack or threat was "actualized" (happened). Would there be a monetary loss? Loss of confidence (in the event of a business breach)? Fine (in the event of a loss of PII or PHI)?

4. Remediation: Research and recommend a security control (i.e. firewall, lock on a door, etc.) that can remediate (prevent, detect, correct, etc.) the attack or threat.

Reference no: EM131553918

Questions Cloud

Write hla assembly program that displays your favorite show : Write an HLA Assembly program that displays your favorite television show on screen in large letters. There should be no input, only output.
Imagine that you own a pharmacy in your area : Imagine that you own a pharmacy in your area. One of your competitors launches a "We will not be undersold" campaign, which promises consumers
How do you evaluate the worker appraisal in this case : Kalyani Electronics Corporation Ltd., recently diversified its activities and started producing computers. It employed personnel at the lower level and middle.
What monetary policies and fiscal policies : What monetary policies and fiscal policies were implemented during the recession from 2007 through 2009?
Identify the impact if the attack or threat was actualized : Identify the impact if the attack or threat was actualized (happened). Would there be a monetary loss? Loss of confidence (in the event of a business breach)?
Explain and apply various hacking technologies and features : Explain and apply various hacking technologies and features that administrators deploy to protect their networks.
Which distribution is used in developing interval estimation : which distribution is used in developing an interval estimation? Which one of the following is the best recommendation?
Leadership roles and responsibilities in your organization : how did your leader display (or not display) aspects of Ethics and Professional Codes of Conduct, Managing Conflict, Strategic Planning and Power and Politics
An ethics officer or oversight committee : Discuss whether or not you believe that Facebook has a legal or ethical duty to rescue a crime victim.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe most frequently encountered internet computer crime

Access the Web site for the Motion Picture Association of America (MPAA) and other Web sites to find estimates of the dollar amount of movie piracy worldwide for at least the past five years.

  Individual company leaders with global company

This solution contrasts and compares individual company leaders with global company leaders and the skills that are in common and different are also discussed.

  Clarify the major role each department plays with is

Clarify the major role each department plays with IS. Explain the importance of information systems management

  Compare and contrast a business case and a business plan

Select a business case template that you like and tell me why you selected that business case template. I want you to reference at least three different business case templates and select the one you believe to be the best.

  Research emerging technology trends

How would you go about researching emerging technology trends? Explain the process in detail and What emerging technologies could have the greatest impact on operations management? Explain your answer.

  Operations management - processes and supply chaindescribe

operations management - processes and supply chaindescribe several processes in the case study that will benefit from

  Find recent article related to issues surrounding it mergers

Find a recent article related to issues surrounding IT mergers or implementation of a new technology in an organization and describe how they were resolved or handled. You can use an example of issues in your own organization and how they were so..

  Summarize the policy and its purpose for management

This section usually contains definitions of technical or ambiguous terms, cross-references to applicable regulations, and other policies that relate to this policy. Examples include union contracts, discipline policies, and implementation guideli..

  Explain and define the following components

As you continue to review the functionality of various operating systems, you also have to look at various components of the computers to ensure that your selected operating system (OS) is compatible with the hardware deployed in your environment...

  How would you feel about being diagnosed by a doctor

From the perspective of a patient, how would you feel about being diagnosed by a doctor who could be hundreds or thousands of miles away from you?

  Plan of correction for improving ergonomic work status

Provide justification for your assessment and a plan of correction for improving ergonomic work status

  Discuss comment in context of growth of information systems

Discuss this comment in the context of the growth of information systems and the pivotal role they now occupy in all organisations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd