Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Note: I have put 3 answer already but i need help to put Risk Matrix in the table what it could be more risk or

Note: I have put 3 answer already but i need help to put Risk Matrix in the table what it could be more risk or you have more idea i'm not good skills in English also not have experience in IT

you also can fix my ans such as Encryption, permissioned, antivirus in the right risk in the table thank you

Use a Risk Matrixto determine the likelihood of your listed data protection threats occurring, and the impact it could have if a breach were to occur. Write the results of your analysis below.

Encryption -very likely/Extreme Important data can be lost or stolen when data is not encrypted, resulting in a significant data breach.

Permissioned Access only - Likely/Major These crucial data files could be corrupted by users with nefarious intentions if permissioned access is not properly set.

Antivirus Protection - Likely / Moderate If no anti-virus software is installed, it is likely that a virus from the internet or a portable USB drive connected into the network will destroy data.

IMPACT
LIKELIHOOD TRIVIAL

MINOR

MODERATE

MAJOR

EXTREME

RARE

Hard drive failure/PC cannot boot EXPOSURE OF DATA Entire site outage/network goes down
UNLIKELY Domain account has been locked out
MODERATE
LIKELY Equipment is not put back in cabinet PHISHING/SPAM EMAILS PERMISSION
VERY LIKELY User cannot login/forgot password Virus infection on computer

Encryption

HDD error

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networking A Top-Down Approach

Authors: James F. Kurose, Keith W. Ross

5th edition

136079679, 978-0136079675

More Books

Students also viewed these Computer Network questions