Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Write atleast three to four points a)Threats that can exploit the Vulnerabilities/Weaknesses that were posted below?b) Risks that can generate loss to an Asset (Hardware, Software, Data, Service, etc

Write atleast three to four  points 

a)Threats that can exploit the Vulnerabilities/Weaknesses that were posted below?

b) Risks that can generate loss to an Asset (Hardware, Software, Data, Service, etc) if the Threat exploit the Weakness?

c)  Countermeasures that can mitigate the Risks. There is often more than one Countermeasure for each Weakness/Threat/Risk?

Vulnerabilities/Weaknesses :

1. Regular Firewall maintenance not conducted

2. Computer always left logged-in

3. Client personal data shared with everyone via email

4. Databases/systems not backed-up

5. Info Sec Audits not conducted

6. Client files left out on the desk overnight

7.Record Cabinets cannot be locked or are left unlocked

8. Inventory control and access control policies not followed.  

Show more
  • @
  • 65 orders completed
ANSWER

Tutor has posted answer for $10.00. See answer's preview

$10.00

******** ******

Click here to download attached files: answer.docx
Click here to download attached files: ASSIGNMENT.docx
Click here to download attached files: ASSIGNMENT.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question