Answered step by step
Verified Expert Solution
Question
1 Approved Answer
1 . Consider this approach: Risk = ( cost of a security breach ) * ( likelihood it will occur ) . The numbers do
Consider this approach: Risk cost of a security breachlikelihood it will occur The numbers do not matter simply think of a number from to that represents the cost of a security breach not important, we will lose lots of money and a number from to that represents the likelihood that it will occur not that likely, it has happened plenty of times before and will likely happen again This approach to security is often called practical security as it focuses the time an organization spends on securing its systems and data, on technologies that are more likely to be breached. Use this quick calculation to determine which of the following you should spend your limited time securing: An internal file server. A web server in the DMZ that hosts company information. An internal print server. The organizations hardwarebased spam filter firewall. Note your calculation for each system as well as your justification for the cost and likelihood values in a short memo. Submit this memo to your instructor. Rubric Marks Risk was calculated, and both the cost and likelihood were justified appropriately. Marks Risk was calculated, but either the cost or likelihood were not justified properly. Marks Risk was calculated, but neither the cost nor likelihood were justified appropriately. Marks Risk was not calculated. Fire Server Web Server Print Server Firewall Total
Consider this approach: Risk cost of a security breachlikelihood it will occur
The numbers do not matter simply think of a number from to that represents the cost of a security breach not important, we will lose lots of money and a number from to that represents the likelihood that it will occur not that likely, it has happened plenty of times before and will likely happen again
This approach to security is often called practical security as it focuses the time an organization spends on securing its systems and data, on technologies that are more likely to be breached.
Use this quick calculation to determine which of the following you should spend your limited time securing:
An internal file server.
A web server in the DMZ that hosts company information.
An internal print server.
The organizations hardwarebased spam filter firewall.
Note your calculation for each system as well as your justification for the cost and likelihood values in a short memo. Submit this memo to your instructor.
Rubric
Marks
Risk was calculated, and both the cost and likelihood were justified appropriately. Marks
Risk was calculated, but either the cost or likelihood were not justified properly. Marks
Risk was calculated, but neither the cost nor likelihood were justified appropriately. Marks
Risk was not calculated.
Fire Server
Web Server
Print Server
Firewall
Total
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started