What type of risk treatment

Assignment Help Computer Network Security
Reference no: EM133394117

Assignment:

Given the risks and budget below, what type of risk treatment (from the list above) would you chose for each specific risk and why?

Budget

$150,000

Hint: The budget is smaller than the cost of all of the products listed, so it will not equal the same amount. The goal of the assignment is prioritize risk and mitigate the most impactful/severe risks.

Risks

  • Default Passwords on 20 devices (no cost)
  • 3 servers running unsupported operating systems (15,000 each to replace)
  • Internally Developed Software is full of vulnerabilities and needs to be redeveloped as it processes sensitive client data. (75,000)
  • The internal environment has no network firewall or intrusion prevention system (IPS) in place (50,000 for firewall and 20,000 for IPS)
  • No security awareness program exists (10,000 for the entire program)
  • There is currently no cyber insurance policy (15,0000 for the policy)

Reference no: EM133394117

Questions Cloud

Analyze the reasons for a recent decision by a business : Analyze the reasons for a recent decision by a business. Start by perusing a newspaper or news website for news about a change that a business made
How has nursing courses and unsucceful from previous : How has nursing courses and unsucceful from previous clincial prepared you to be successful in anotherclinical? What will you do differently to ensure success
How people often behave in an irrational way : How people often behave in an irrational way (in the field of economics, financial decisions or consumer choice), according to this bias
Describe your own efforts to apply breadth to your thinking : Describe your own efforts to apply breadth to your thinking when it comes to ethical issues? Are you good at it? Is it difficult for you
What type of risk treatment : Given the risks and budget below, what type of risk treatment (from the list above) would you chose for each specific risk and why?
Chose from any topics in mental health ranging from clinical : Chose from any topics in mental health ranging from clinicals, labs or theory as a reflection piece. Please include any new ideas or interventions
How many doughnuts will bay coffee produce in the cournot : How many doughnuts will Bay Coffee produce in the Cournot equilibrium and What will be the price of a doughnut in James Bay in the Cournot equilibrium
What is it that creates profit, according to mises : What is it that creates profit, according to Mises and why does Mises say that people who tax profits are "injuring themselves
What is the connection between our studies and the article : What is the connection between our studies and the article? How do our studies help explain the information in the article? How do our studies help you better u

Reviews

Write a Review

Computer Network Security Questions & Answers

  Each discussion question should be answered with about 200

each discussion question should be answered with about 200 words. no references should be used. responses should be

  Explain how a piece of shellcode can bypass

Explain how a piece of shellcode can bypass an intrusion detection system and list the shellcode issues related to computer forensic investigations

  Briefly explain how a tcp connection starts

COIT20262 - Advanced Network Security- Briefly explain how a TCP connection starts (or opens), and how it completes (or closes), using the 1st TCP connection

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means

  Determine the legal and ethical considerations

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  Why should website operators that allow users to add content

Why should Website operators that allow users to add content, for example, forums or blogs, carefully and consistently patch and configure their systems?

  Describe your initial thoughts on the best advantage

Describe your initial thoughts on the best advantage over the other system's services they posted. Note any major similarities or differences your notice between the different services.

  Provide additional insights into how information security

Provide additional insights into how Information Security as a course better prepares an individual to interact with both users and technologists

  Computer crime events in history

Research the Internet for two significant computer crime events in history. Gather details on the impacts of these crimes and identify the victims, identify details on how the researched crimes developed throughout time.

  Discuss privacy issues as they are related to computers

Discuss privacy issues as they are related to computers / networks / the Internet. What is privacy? Why is it important? Does the law afford any expectations

  Conduct a vulnerability, threat, and security assessment

You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation

  Business continuity plan or disaster recovery plan

In order for an organization to develop an effective business continuity plan or disaster recovery plan, it must know what information assets it has, their impact on business operations, and the criticality and priorities associated with the infor..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd