Identify what might be a personal or business asset

Assignment Help Computer Engineering
Reference no: EM132232676

Question: Please identify the following, focusing on step 4, remediation, in keeping with the focus of the lesson this week. Identify if that security control you are recommending to protect your asset is preventive, detective, or corrective.

1. Asset identification: Identify what might be a personal or business asset (think of something you have at home that you would like to protect, or something that your company has that needs protection).

2. Attacker/threat identification: Who are the likely attackers to that asset? What other threats are there that can negatively impact that asset? Remember that an attacker is always a person with intent, and is only one type of threat - we also have natural disasters, accidents, etc. that are not "attacks" as they don't have malicious intent behind them.

3. Impact: Identify the impact if the attack or threat was "actualized" (happened). Would there be a monetary loss? Loss of confidence (in the event of a business breach)? Fine (in the event of a loss of PII or PHI)?

4. Remediation: Research and recommend a security control (i.e. firewall, lock on a door, etc.) that can remediate (prevent, detect, correct, etc.) the attack or threat.

Reference no: EM132232676

Questions Cloud

What would you say in the policy : You have been asked to draft a corporate usage policy regarding the use of instant messaging. The policy should encourage the use of IM.
Create a step-by-step it security policy for a student : Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
Write a python program that reads in academic achievements : Write a Python program that reads in the academic achievements of three international applicants and determines which one is the best candidate.
When do you think a project team should plan for testing : When do you think a project team should plan for testing? Provide a justification behind your position. Who do you think is the best resource(s).
Identify what might be a personal or business asset : Identify what might be a personal or business asset (think of something you have at home that you would like to protect, or something that your company.
How knowledge-skills or theories of course have been applied : Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied.
Determine how do the teams manage their team boundaries : Consider the different teams presented in your reading assignment. How do the teams manage their team boundaries?
How does the study of threats modeling help us : A responsible Citizen practices leadership, ethics, global awareness, and personal responsibility. How does the study of Threats Modeling help us contribute.
Discuss best practices use to mitigate the perceive problems : Research: Research and discuss best practices use to mitigate some of the perceive problems with cryptology from your research in discussion one.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Name at least five different scans that might be performed

question 1 name at least five different scans that may be performed from the zenmap gui. document under what

  Design an algorithm to test whether a binary tree

Write a method that checks whether a binary tree. Design an algorithm to test whether a binary tree.

  Identify the fundamentals of public key infrastructure

Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted.

  Research various command-line interfaces

List and explain some of the commands that are easier using a command-line interface versus using a GUI. List and explain some of the commands that are easier using a GUI versus using a command-line interface.

  What is the capacity for user data in mode 1

What is the exact data capacity (in bytes) of a mode-2 CD-ROM containing the now-standard 80-min media? What is the capacity for user data in mode 1?

  Provide function voidclearscreen that will clear the window

I have supplied a header file called assn.hto be utilized with this assignment: it provides the function voidclearScreen()that will clear the terminal window, to be invoked at specified spots within the algorithm.

  Questionassume we have three classes alarmclock beeper and

questionassume we have three classes alarmclock beeper and alarmwindow. in following you see an interaction showing an

  How can the algorithm be subtly changed to prevent the race

When two users examine registry in simultaneously, they may accidentally pick same idle workstation. How can algorithm be subtly changed to prevent this race?

  Write 8086 program to find the more number repeated

Write 8086 program to find the more number repeated in list of 10 numbers starting from DS:0011 to DS:001A and save value of this number.

  Implement the solution for tracking the number of subscribe

In a social media news feed, users are required to subscribe to the news feed before receiving any news or updates. Users can only subscribe to each news feed only once up to five different feeds.

  What mean to take a systems view of a project

What does it mean to take a systems view of a project? How does taking the systems view of a project apply to project management.

  Does your company have a current disaster recovery plan

Does your company (or school) have a current disaster recovery plan? What are some of the activities involved in it? Do you feel confident that your company.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd