Tuesday, September 10, 2019
Na Research Paper Example | Topics and Well Written Essays - 500 words
Na - Research Paper Example 5. Briefly explain the difference between the qualitative and quantitative risk analysis processes. Qualitative risk analysis process is done through the use of questionnaires and workshops in order to calculate the relative values of assets while a quantitative risk analysis is done through assigning hard financial values to assets. 6. Why is it so necessary to have a diversified team with a variety of experiential and work-related backgrounds for the RA? It is necessary to have a diversified team with a variety of experiential and work related background for the RA to be able to bring out their knowledge, experience and understanding about the assessment and to respond effectively to new dangers as they arise. 7. a) Briefly describe how each selection below is a threat to a network and b) list two vulnerability examples that you would look for/interview for when researching each. Do not provide the same vulnerability for more than one threat. The computer software will crash or will have system failure that results to software bug, power failure and malfunction of the system. The improper use of computers by humans and the system was not designed well are the vulnerability examples of this kind threat. They can create a serious risk to information security. Using unauthorized personal devices such as USB on secure network and passing secret information over non secure method or system to get information are the vulnerability examples of this kind threat. This threat alters or removes information from files. Not having policy restricting the provision of information by the staff of the phone and the system doesnââ¬â¢t have a protected password are the two vulnerability examples of this kind threat. This threat slows down the computer and destroys the computer files. The software doesnââ¬â¢t have anti-virus and the programs downloaded from the internet has malicious software in it are the two vulnerability examples of this kind threat. This
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.