Case Study: Information Security Risk Assessment – Answer Sheet

Case Study: Information Security Risk Assessment – Answer Sheet

 

 

Table-1

AssetsVulnerabilitiesThreatsProbability (the numerical value)Impact

(the numerical value)

Risk

(the numerical value)

Risk = Probability x Impact

 

 

 

     
 

 

 

     
 

 

 

     

 

 

Probability (the numerical value)Your Justification (Why you assigned that value for the probability)
  
  
  

 

 

Impact (the numerical value)Your Justification (Why you assigned that value for the impact)
  
  
  

 

 

 

Table-2

Definition of RiskPriorityRisk Response (Risk Acceptance, Risk Mitigation, Risk Avoidance, Risk Transfer, etc.)
The exploitation of the <vulnerability> of <asset> by <threat>  
The exploitation of the <vulnerability> of <asset> by <threat>  
The exploitation of the <vulnerability> of <asset> by <threat> 

You didn't find what you were looking for? Upload your specific requirements now and relax as your preferred tutor delivers a top quality customized paper

Order Now