Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Government agencies, corporations, universities and small businesses are now tasked with performing risk assessments to determine the level of cybersecurity vulnerabilities for networks, intellectual property,

Government agencies, corporations, universities and small businesses are now tasked with performing risk assessments to determine the level of cybersecurity vulnerabilities for networks, intellectual property, personnel and more. The process of performing these risk assessments can ensure that an agency or company has identified the risk level, mitigated potential threats and implemented options to protect assets.


Imagine you are a member of your law enforcement agency’s Risk Assessment Team tasked to complete a risk assessment.


Information

Threats

Vulnerability

Risk Level

Community Cost

Provide a list of at least ten information assets for a law enforcement agency in this column. Examples are: personnel records, 911 Calls for Service database, Arrest database, etc.

Please identify at least two threats to each of the information assets in the first column. As noted in the article, the possible threats are as follows: mobile, natural, internal, physical, social, malicious and network. Explain each threat.

Please identify any vulnerabilities that may cause the information asset to be compromised or exposed. (Provide at least two.)

Please identify the probability that the information asset will be targeted. The potential risk levels are: low, medium and high.

Please identify the cost to the community, if the information asset is accessed, stolen or compromised.

Information Asset 1

Information Asset 2

Information Asset 3

Information Asset 4

Information Asset 5

Information Asset 6

Information Asset 7

Information Asset 8

Information Asset 9

Information Asset 10

Step by Step Solution

3.45 Rating (161 Votes )

There are 3 Steps involved in it

Step: 1

Information Ten Information assets can be divided into 3 parts viz Hardware Software Network they are as follows Hardware Hardware Trojan illegal Clones SideChannel Attacks Software Software Programmi... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Electronic Devices and Circuit Theory

Authors: Robert L. Boylestad, Louis Nashelsky

10th edition

135026490, 978-0135026496

More Books

Students also viewed these Accounting questions