Assignment Document

Optimal risk assessment for Cyber thread Intelligence

Pages:

Preview:


  • "ContentsLiterature Review: .......................................................................................................................... 3Introduction: ......................................................................................

Preview Container:


  • "ContentsLiterature Review: .......................................................................................................................... 3Introduction: ................................................................................................................................ 3Analysis of Optimal Risk ................................................................................................................ 3Risk assessment and cyber threat intelligence: ........................................................................... 4The DML model and its implications: ........................................................................................ 6Conclusion ...................................................................................................................................... 8References ....................................................................................................................................... 8 2 | P a g e Literature Review:Introduction:In spite of the tough security in the organizations and online sites, there is breach in the securitysystem of those companies which we came to know from time to time with the theft of theinformation and leaking that information into the public. With the growth in the globalization,the technology has grown rapidly and with the technological advancements, there is breach in thesecurity systems of the companies and MNCs, with the help of which the important data arestolen from the database of the company and are used or sold in the market at high rate. Analysis of Optimal Risk Due to the rapid changing of the environment, the risks are always changing, and so it is verydifficult for the company to stick to a definite system in order to protect their company data. Inthe year 2005, Haley stated that the wicked problems are the kind of problems that is a breach tothe security and re the most difficult ones to solve. He further added that, in order to solve theseproblems the first step is to understand the root of the problem, which is very difficult to know aswicked problems have incompatible requirements and are unclear. As the security analysts aredifferent in all the cases, the solution to the problems can also be different in most of the casesaccording to Stoneburner, who stated this in the year 2002. There are various problems and mostof the problems are of a unknown type, which breaches the security of a workplace. According toDutoit, in the year 2006 he stated that the design of the security should be made in such a waythat it helps to reduce the ambiguity with the help of making a representative model for thesolution of the collective problem (Sara Qamar, 2017).3 | P a g e "

Why US?

Because we aim to spread high-quality education or digital products, thus our services are used worldwide.
Few Reasons to Build Trust with Students.

128+

Countries

24x7

Hours of Working

89.2 %

Customer Retention

9521+

Experts Team

7+

Years of Business

9,67,789 +

Solved Problems

Search Solved Classroom Assignments & Textbook Solutions

A huge collection of quality study resources. More than 18,98,789 solved problems, classroom assignments, textbooks solutions.

Scroll to Top