logo

Information Threat Security | Report

14 Pages3214 Words48 Views
   

Added on  2020-01-28

Information Threat Security | Report

   Added on 2020-01-28

ShareRelated Documents
INFORMATION THREAT SECURITY
1
Information Threat Security | Report_1
Table of Contents
Introduction..........................................................................................................................................3
Q.1 Describing the data and information assets associated with Cobweb.......................................3
Q. 2 Describing impact of all threats on the identified data assets.................................................4
Q. 3Examining each asset– threat pairing and produce a vulnerability matrix ..............................5
Q. 4 Assuming there are no specific controls in place to protect the data assets in question. You
may assume general controls such as anti-virus software, logical access controls etc. are already
in place., however for completeness, you may want to list these as well and then ‘cross them off’
as already existing controls..............................................................................................................6
5. Calculation of risk factors ...........................................................................................................7
Q. 6 and 7. Reasonable risk appetite value and propose suitable countermeasures with
justifications ....................................................................................................................................7
Conclusion............................................................................................................................................9
References..........................................................................................................................................10
2
Information Threat Security | Report_2
Illustration Index
Illustration 1: Reasonable risk appetite value.....................................................................................10
3
Information Threat Security | Report_3
Index of Tables
Table 1: Mcleod, 2008Vulnerability matrix.........................................................................................7
Table 2: List of controls........................................................................................................................8
Table 3: Calculation of risk factors ......................................................................................................9
4
Information Threat Security | Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
MSc Cyber Security and Forensics.
|2
|431
|369

Security Problems and Risk Management of CobWeb
|7
|1108
|410

Risk Management Assignment - Cloud Services
|6
|1018
|119

IT Risk Management: Conducting a Risk Assessment and Developing a Security Policy
|12
|3074
|482

IT Security Risks and Solutions for Organizations
|15
|4389
|158

Student Grading System Security
|12
|2145
|385