Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Create an application (i.e., excel) that demonstrates the assessment of various risk components, threats, vulnerabilities against a cyber compromise scenario utilizing risk management framework. -

Create an application (i.e., excel) that demonstrates the assessment of various risk components, threats, vulnerabilities against a cyber compromise scenario utilizing risk management framework.

- Design a tool with multiple selections and include and apply risk assessment (likelihood and impact) to demonstrate final risk (residual) for a given cyber compromise scenario

- Use of the CIA model of Information security and apply to the scenario if required

- Apply Vulnerability and Threat information to calculation

- Apply existing compensating controls to the risk

- Final Risk Score demonstration

- User should be able to add or remove additional risks, threats, vulnerabilities, or controls

--->Create a simple database of scenarios to pick from::::

- Data exfiltration from a sensitive database that holds PI

- Privilege Credential compromise to access Network domain controllers

- Lateral movement of an Attacker inside a Network

- DDOS Attack that might impact the availability of a critical Service

- Ransomware Attack

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Pro PowerShell For Database Developers

Authors: Bryan P Cafferky

1st Edition

1484205413, 9781484205419

More Books

Students also viewed these Databases questions