Description
Understanding Risk Assessment Methodology
Consider the risk to "integrity of customer and financial data files
on system" from "corruption of these files due to import of a worm/virus
onto a system," as discussed in Problem 14.2 in your textbook. From the
list shown in Table 15.3 in your textbook, select some suitable
specific controls that could reduce this risk. Indicate which you
believe would be most cost effective. Support your answers with
references.
Your well-written paper should meet the following requirements:
APA
- Paper length: 2-3 pages
- Include an illustrative table, graphic, or other diagram that can be
created or included from properly cited external references.
- Include two external, scholarly references in addition to the textbook. Do not use blogs, wikis, or other non-scholarly sources.
14.3 - Rating : Consequence
1:Insignificant
2:Minor
3:Moderate
4:Major
5:Catastrophic
6:Doomsday
15.3-Security Controls
Access control
Awareness training
Audit and Accountability
Security assessment and authorization
Configuration Management
Contingency Planning
Identification and Authentication
Incident Response
Maintenance
Media Protection
Physical and Environmental Protection
Planning
Personnel Security
Risk Assessment
System and Services Acquisition
System and Communication Protection
System and Informational integrity
Program Management