Describe how you will test for associated risk

Assignment Help Basic Computer Science
Reference no: EM131161841

Computer Science

Section: Controlling Risk

• Given the following categories or areas where risk exists, and then the 3 assets for each, describe how you will test for associated risk:

o Administrative

- Human resources: Hiring and termination practices
- Organizational structure: A formal security program
- Security policies: Accurate, updated, and known or used

o Technical

- Access control: Least privileged
- System architecture: Separated network segments
- System configurations: Default configurations

o Physical

- Heating and air conditioning: Proper cooling and humidity
- Fire: Fire suppression
- Flood: Data center location

• Once you have described the tests that will be conducted to test each, assume that failure or holes were found in each of them.

• Next, describe at least 3 safeguards for each that could be put in place to address the risk.

Reference no: EM131161841

Questions Cloud

Density of the resulting liquid : The density of two liquids (A and is given as 1000 kg/m3 and 600 kg/m3, respectively. The two liquids are mixed in a certain proportion and the density of the resulting liquid is 850 kg/m3.
Is identity development ever complete why or why not : Review Erikson's stage of identity versus identity confusion in your readings for the module. Respond to the following: Is identity development ever complete? Why or why not? What are the signs that someone has reached identity achievement
Explain whether each is a natural experiment or not : We are interested in identifying the impact of prenatal visits on infant health. An economist notices that there is a great deal of variation in the number of prenatal visits mothers attend due to the amount of insurance coverage they have. Mother..
What are the consequences : Using your CIKR paper from the previous assignment, continue the risk analysis of your CIKR being impacted by a natural disaster, terrorism or technological event. Answer the following questions for each type of event: (1) what can happen? (2) how..
Describe how you will test for associated risk : Given the following categories or areas where risk exists, and then the 3 assets for each, describe how you will test for associated risk:
What happens to their sleep cycle-waking cycle : When a person is shut off from the world such that he cannot even tell what time it is by light or dark, what happens to their sleep cycle-waking cycle
Daily life within various religions and current affairs : Use at least three (3) quality resources as references for the assignment and document your sources using APA Style for in-text citations and references. Note: Wikipedia and similar Websites do not qualify as quality resources.
Speed of sound be calculated : How can the speed of sound be calculated and how does a starting pistol allow you to do this?
Find acceleration when given velocity and distance : How do you find acceleration when given velocity and distance?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain the it department is facing a personnel shortage

The IT department is facing a personnel shortage in the networking area, and is looking for a resource to fill the position This could lead to a network engineer position opportunity at the company.

  What might be some of the inhibitors on organizations

What might be some of the inhibitors on organizations or institutions who newly desire a global presence? Why is that management, a relatively small percentage of the work force, has become the prime user of information technology, as opposed to the ..

  Give an example of an array and how it could be used

Give an example of an Array and how it could be used

  Find the second plain text

Find the second plain text x2 - Can somebody provide the answer for given question with example?

  Order it by faculty last name in descending order

Write a SELECT statement that will return the faculty last name, faculty first name and the room for faculty whose offices are located in the 'LIB' building. Order it by faculty last name in descending order. This is in MySQL

  Question regarding the mobile computing security

What are some of the current trends organizations face with mobile computing security and what are some of the remediation steps companies take to ensure data confidentiality and integrity?

  Seminal paper by diffie and hellman

Appearing in the seminal paper by Diffie and Hellman, the first published public-key algorithm that defined public-key cryptography [DIFF76] is referred to as the Diffie-Hellman key exchange (Stallings & Brown, 2008, p. 641).

  A complex and highly sophisticated computer worm

In June 2010, Stuxnet, a complex and highly sophisticated computer worm was discovered by Kaspersky Lab. Stuxnet targeted Siemens industrial Supervisory Control and Data Acquisition (SCADA) systems. It was reported that the worm appeared to target Ir..

  Examine the challenges of developing erp system

Examine the challenges of developing ERP system

  Main differences between client-server

What are the main differences between client/server and web applications? Give your opinion on what Thomas L. Friedman is referring to with the words, "Now the real IT revolution is about to begin." Discuss how the beginning, referred to by Friedm..

  Multitasking operating system

You are testing out a new multitasking operating system. In your testing, you find that some applications are not getting sufficient CPU time while others are getting more than necessary. Which component is likely to be the cause of this problem?

  Provide an explanation of hashtables

In your comparison, be sure to include an explanation of one way hashtables are similar to your selected data structure and one way in which they are different.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd