Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Identify the assets and prioritization of those assets. (Assets can be information, tools, servers, applications, personnel, etc.) Evaluate the threats, including impact and likelihood. Evaluate

  • Identify the assets and prioritization of those assets. (Assets can be information, tools, servers, applications, personnel, etc.)
  • Evaluate the threats, including impact and likelihood.
  • Evaluate vulnerabilities.
  • Identify risk (risk = threat x vulnerability).
  • Explain the risk option(s) chosen for each risk. This may be avoid, transfer, accept, or reduce. Note: In most cases, reduce is the more acceptable choice; however, if you choose otherwise, be sure to explain your justification.
  • Identify security controls implemented to reduce risk (this includes least privilege, SoD, passwords, etc.).

Scenario:

Company have one database administrator (DBA) and back up their ordering system to the cloud. They have two system administrators to work on the local servers. Because their manufacturing process is proprietary, that is kept locally in the California office on the servers there.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing and Assurance services an integrated approach

Authors: Alvin a. arens, Randal j. elder, Mark s. Beasley

14th Edition

133081605, 132575957, 9780133081602, 978-0132575959

More Books

Students also viewed these Databases questions