Answered step by step
Verified Expert Solution
Question
1 Approved Answer
A risk is real when there is a presence of threat (such as a willing and capable attacker), a vulnerability that the attacker can
A risk is real when there is a presence of threat (such as a willing and capable attacker), a vulnerability that the attacker can exploit, and a high likelihood that the attacker will carry out the threat. (a) Describe the TWO (2) types of losses when the vulnerability is exploited by hostile user. Using suitable example, calculate the annual loss expectancy (ALE) for the two losses. (b) (c) [10 marks] Briefly explain the FIVE (5) types of control can be implemented as the countermeasures for vulnerability. [5 marks] Suggest suitable countermeasure for one of the losses in Q1(a) and justify your answer accordingly. [5 marks] (d) Under what situation the management would have to give up implementing the countermeasure and accept the risk? Describe the risk acceptance process. [5 marks]
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started