Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

so I have this activity to work on also using this chart this is from my computer networking security class so I have to find

so I have this activity to work on also using this chart this is from my computer networking security class so I have to find the three assets then calculating the risk based on the qualities approach image text in transcribed
Performing a Qualitative Risk Analysis In this exercise, you will identify a few assets within your organization and performa qualitative risk assessment by identifying example threats against the asset and then calculating the risk based on a qualitative approach. 1. On a piece of paper, or using your favorite word processor, identify three different assets within your organization 2. Identify three or four threats against each asset 3. Using the scale for probability displayed in Table 15-1, record the probability value for each threat 4. Using the scale of impact displayed in Table 15-2, record the impact each threat will have 5. Calculate the risk based on the formula of risk = probabliry x loss (Impact) and then prioritise the threats based on the highest risk being the highest priority TABLE 15-1 Value Probability Highly Unlikely An Example Probability Scale Description Chances of this threat occurring are slim to none. Although this is a risk, it is most likely not going to cut This threat could occut, but is still on the not-likely to Not Likely to Occur cur side Likely 3 This threat is a common threat to the set, but is not the most likely to occur. This threat has a pood chance of occurring Chances are extremely high that this threat will occur Good Chance Most Likely to Occur 4 5 TABLE 15-2 Value 1 An Example Impact (Loss) Scale Impact Almost No Impact Low Impact Average Impact 2 Description This threat causes next to no damage. This threat causes little damage This threat causes some damage that will incur cost to recover from This threat causes quite a bit of dumage This threat causes serious damage to the company with 3 4 Medium Impact High Impact 5 great

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Practical Azure SQL Database For Modern Developers Building Applications In The Microsoft Cloud

Authors: Davide Mauri, Silvano Coriani, Anna Hoffma, Sanjay Mishra, Jovan Popovic

1st Edition

1484263693, 978-1484263693

More Books

Students also viewed these Databases questions

Question

Discuss why unions exist.

Answered: 1 week ago

Question

How many threads does an SMT - enabled, 1 6 - core CPU offer?

Answered: 1 week ago