What type of risk treatment

Assignment Help Computer Network Security
Reference no: EM133394117

Assignment:

Given the risks and budget below, what type of risk treatment (from the list above) would you chose for each specific risk and why?

Budget

$150,000

Hint: The budget is smaller than the cost of all of the products listed, so it will not equal the same amount. The goal of the assignment is prioritize risk and mitigate the most impactful/severe risks.

Risks

  • Default Passwords on 20 devices (no cost)
  • 3 servers running unsupported operating systems (15,000 each to replace)
  • Internally Developed Software is full of vulnerabilities and needs to be redeveloped as it processes sensitive client data. (75,000)
  • The internal environment has no network firewall or intrusion prevention system (IPS) in place (50,000 for firewall and 20,000 for IPS)
  • No security awareness program exists (10,000 for the entire program)
  • There is currently no cyber insurance policy (15,0000 for the policy)

Reference no: EM133394117

Questions Cloud

Analyze the reasons for a recent decision by a business : Analyze the reasons for a recent decision by a business. Start by perusing a newspaper or news website for news about a change that a business made
How has nursing courses and unsucceful from previous : How has nursing courses and unsucceful from previous clincial prepared you to be successful in anotherclinical? What will you do differently to ensure success
How people often behave in an irrational way : How people often behave in an irrational way (in the field of economics, financial decisions or consumer choice), according to this bias
Describe your own efforts to apply breadth to your thinking : Describe your own efforts to apply breadth to your thinking when it comes to ethical issues? Are you good at it? Is it difficult for you
What type of risk treatment : Given the risks and budget below, what type of risk treatment (from the list above) would you chose for each specific risk and why?
Chose from any topics in mental health ranging from clinical : Chose from any topics in mental health ranging from clinicals, labs or theory as a reflection piece. Please include any new ideas or interventions
How many doughnuts will bay coffee produce in the cournot : How many doughnuts will Bay Coffee produce in the Cournot equilibrium and What will be the price of a doughnut in James Bay in the Cournot equilibrium
What is it that creates profit, according to mises : What is it that creates profit, according to Mises and why does Mises say that people who tax profits are "injuring themselves
What is the connection between our studies and the article : What is the connection between our studies and the article? How do our studies help explain the information in the article? How do our studies help you better u

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd