Information assets to evaluate for risk management

Assignment Help Other Subject
Reference no: EM1364119

"If an organization has three information assets to evaluate for risk management as shown in the accompanying data, which vulnerability should be evaluated for additional controls first? Which one should be evaluated last?

Explain your reasons.

a. Switch L47 connects a network to the Internet. It has two vulnerabilities: it is susceptible to hardware failure at a likelihood of 0.2, and it is subject to an SNMP buffer overflow attack at a likelihood of 0.1. This switch has an impact rating of 90 and has no current controls in place. You are 75 percent certain of the assumption and data.

b. Server WebSrv6 hosts a company Web site and performs e-commerce transactions. It has a Web server version that can be attacked by sending it invalid Unicode values. The likelihood of that attack is estimated at 0.1. The server has been assigned an impact value of 100 and a control has been implanted that reduces the impact of the vulnerability by 75 percent. You are 80 percent certain of the assumption and data.

c. Operators use a MGMT45 control console to monitor operations in the server room. It has no passwords and is susceptible to unlogged misuse by the operators. Estimates show the likelihood of misuse is 0.1. There are no controls in place on this asset; it has an impact rating of 5. You are 90 percent certain of the assumptions and data.

Reference no: EM1364119

Questions Cloud

Materials requirement analysis and planning : Show ways the company you researched could benefit materials requirement planning.
Compute the charge on the ion : A uniform electric field of magnitude 445 N/C pointing in the positive x-direction acts on an electron, that is initially at rest. The electron has moved 3.10 cm.
Compute the cost of retained earnings : A Corporation stock is selling for $78. The next annual dividend is expected to be 2.70. The growth rate is 9 percent. The flotation cost is 5.00.
Earnings trends and normative theory-education : Evaluate how research and normative theory impacts accounting education today and the likely impact that more research may have on the accounting profession.
Information assets to evaluate for risk management : "If an organization has three information assets to evaluate for risk management as shown in the accompanying data, which vulnerability should be evaluated for additional controls first? Which one should be evaluated last?
Living wills : Living Wills - importance of asking patient's about a living will or advanced directive
Utilize a supply and demand model to model this phenomenon : The article also notes that, as a consequence of the rent control laws, the price of owner occupied housing has increased greatly. Utilize a supply and demand model to model this phenomenon as well.
Job roles and tasks : Identify a show with two segments to review and for each of the two segments in that show, identify the items below. To do this you may wish to use a spreadsheet or set up a table so that your data makes sense.
Find the potential difference between a point : Find out the potential difference between a point.

Reviews

Write a Review

Other Subject Questions & Answers

  Sexual and personality disorders

Examine the various diagnoses assoicated with eating, substance abuse, sex/gender/sexual and personality disorders.

  Real life example of a behavior management program

You will be reading a journal article related to a real life example of a behavior management program with real results.

  Overview of stem cell research

Give an overview of Stem cell research as an issue that is happening outside the Unites States. Explain what interests you about this topic and why you selected it.

  Managing the social responsibilities

Multinational corporations and other firms must abide by the laws and regulations of their host countries.

  Validity of assessing intelligence

The assessment of cognitive abilities draws a range of opinions in terms of the validity of assessing "intelligence".

  Hypothetical research study utilizing descriptive research

Create a statement of the problem (tells what the study is about and why we are doing it) for a hypothetical research study utilizing descriptive research methods for sexually abused children and pet therapy.

  Neurophysiological and neuroanatomical mechanisms

How are the neurophysiological and neuroanatomical mechanisms associated with the formation of the perception of phantom limbs and the perceptual phenomenon of synaesthesia similar?

  Russian chess master kasparov versus deep blue

How is it possible that a human being can rival the capabilities of most modern computers? Describe your answer.

  Poviding the vital information about key facts

How can something be a key fact in one case and only background in another? Distinguishing between key facts and background.

  Explain assimilition and pluralism views of diversity

Explain Assimilition and Pluralism views of diversity.

  Motivational factors involved in your behavior

Please help me to understand a description of a scenario that illustrates two levels of Maslow's Hierarchy of Needs and explain how it does so. Then, explain how Maslow's theory may not capture all of the motivational factors involved in your beha..

  Govern employment and ethical practices

Imagine that you are a manager of the HR department of a company and you are required to lay off one of your employees. Propose two ways that you can ensure you are abiding by the laws that govern employment and ethical practices. Respond and evaluat..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd