Question
Government agencies, corporations, universities and small businesses are now tasked with performing risk assessments to determine the level of cybersecurity vulnerabilities for networks, intellectual property,
Government agencies, corporations, universities and small businesses are now tasked with performing risk assessments to determine the level of cybersecurity vulnerabilities for networks, intellectual property, personnel and more. The process of performing these risk assessments can ensure that an agency or company has identified the risk level, mitigated potential threats and implemented options to protect assets.
Imagine you are a member of your law enforcement agency’s Risk Assessment Team tasked to complete a risk assessment.
Information | Threats | Vulnerability | Risk Level | Community Cost | |
Provide a list of at least ten information assets for a law enforcement agency in this column. Examples are: personnel records, 911 Calls for Service database, Arrest database, etc. | Please identify at least two threats to each of the information assets in the first column. As noted in the article, the possible threats are as follows: mobile, natural, internal, physical, social, malicious and network. Explain each threat. | Please identify any vulnerabilities that may cause the information asset to be compromised or exposed. (Provide at least two.) | Please identify the probability that the information asset will be targeted. The potential risk levels are: low, medium and high. | Please identify the cost to the community, if the information asset is accessed, stolen or compromised. | |
Information Asset 1 | |||||
Information Asset 2 | |||||
Information Asset 3 | |||||
Information Asset 4 | |||||
Information Asset 5 | |||||
Information Asset 6 | |||||
Information Asset 7 | |||||
Information Asset 8 | |||||
Information Asset 9 | |||||
Information Asset 10 |
Step by Step Solution
3.45 Rating (161 Votes )
There are 3 Steps involved in it
Step: 1
Information Ten Information assets can be divided into 3 parts viz Hardware Software Network they are as follows Hardware Hardware Trojan illegal Clones SideChannel Attacks Software Software Programmi...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started