Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A risk is real when there is a presence of threat (such as a willing and capable attacker), a vulnerability that the attacker can

 

A risk is real when there is a presence of threat (such as a willing and capable attacker), a vulnerability that the attacker can exploit, and a high likelihood that the attacker will carry out the threat. (a) Describe the TWO (2) types of losses when the vulnerability is exploited by hostile user. Using suitable example, calculate the annual loss expectancy (ALE) for the two losses. (b) (c) [10 marks] Briefly explain the FIVE (5) types of control can be implemented as the countermeasures for vulnerability. [5 marks] Suggest suitable countermeasure for one of the losses in Q1(a) and justify your answer accordingly. [5 marks] (d) Under what situation the management would have to give up implementing the countermeasure and accept the risk? Describe the risk acceptance process. [5 marks]

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Entrepreneurship

Authors: Andrew Zacharakis, William D Bygrave

5th Edition

1119563097, 9781119563099

More Books

Students also viewed these Programming questions

Question

Use Eq. (6) to estimate Af = f(3.53, 8.98) - f(3.5,9)

Answered: 1 week ago

Question

. MIRR Eu of #1200o C a yea PMT= 2000 2. . 55 5. SPES,oce Id

Answered: 1 week ago