Perform a limited risk management study on your personal computer. Do an asset identification, threat identification, vulnerability appraisal, risk assessment, and risk mitigation. What major...

1 answer below »
Perform a limited risk management study on your personal computer. Do an asset identification, threat identification, vulnerability appraisal, risk assessment, and risk mitigation. What major vulnerabilities did you uncover? How can you mitigate the risks? Write a one page paper on your analysis.


Document Preview:

Assignment 6 Perform a limited risk management study on your personal computer. Do an asset identification, threat identification, vulnerability appraisal, risk assessment, and risk mitigation. What major vulnerabilities did you uncover? How can you mitigate the risks? Write a one page paper on your analysis.






Assignment 6 Perform a limited risk management study on your personal computer. Do an asset identification, threat identification, vulnerability appraisal, risk assessment, and risk mitigation. What major vulnerabilities did you uncover? How can you mitigate the risks? Write a one page paper on your analysis.
Answered Same DayDec 20, 2021

Answer To: Perform a limited risk management study on your personal computer. Do an asset identification,...

David answered on Dec 20 2021
109 Votes
Risk Management Study on my Personal Computer
Asset Identification
· Data (pictures, music, videos
, documents like inventory & organizational records)
· Hardware (PCs, servers)
· Software (operating system, application softwares)
Threat identification
· Hardware failure due to dust, humidity, power surge, malfunctioning, manufacturing fault.
· Software failure due to software crash, improperly written software, malicious software
· Network Issues like network failure, network congestion, network intrusion
· Personnel as a threat trying social engineering.
Vulnerability appraisal
Current security must be analyzed all the assets must be tested under every known threat, to know about new threats and vulnerabilities.
Risk assessment
It is done to know about the damage caused by the attack by a threat to analyze the impact of the threat.
Risk mitigation
After...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here