Answered You can hire a professional tutor to get the answer.

QUESTION

1. Using the IT infrastructure security design you created in Module 1, list the five “highest” risks that you would consider a major incident to the Confidentiality, Integrity and Availability (C.I.A

1. Using the IT infrastructure security design you created in Module 1, list the five “highest” risks that you would consider a major incident to the Confidentiality, Integrity and Availability (C.I.A. Triad) of processing data between the data centers. Include the reasons why you chose each of the five risks.

2. The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk. Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose. Include your reason why you chose the strategy for each of the five risks.

2. The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk. Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose. Include your reason why you chose the strategy for each of the five risks.

PLEASE CHECK FOR GRAMMATICAL ERRORS. DON'T USE BOOKS OR JOURNALS AS REFERENCES.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question