Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Please identify the following, focusing on step 4, remediation, in keeping with the focus of the lesson this week. Identify if that security control you are recommending to protect your asset is preventive, detective, or corrective.

1. Asset identification: Identify what might be a personal or business asset (think of something you have at home that you would like to protect, or something that your company has that needs protection).

2. Attacker/threat identification: Who are the likely attackers to that asset? What other threats are there that can negatively impact that asset? Remember that an attacker is always a person with intent, and is only one type of threat - we also have natural disasters, accidents, etc. that are not "attacks" as they don't have malicious intent behind them.

3. Impact: Identify the impact if the attack or threat was "actualized" (happened). Would there be a monetary loss? Loss of confidence (in the event of a business breach)? Fine (in the event of a loss of PII or PHI)?

4. Remediation: Research and recommend a security control (i.e. firewall, lock on a door, etc.) that can remediate (prevent, detect, correct, etc.) the attack or threat.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92879256
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Management Information System

Topic1 what major government hit initiatives have been

Topic: 1.) What major government HIT initiatives have been taken by the government over the last several years? (Use current examples) Provide several examples and discuss their importance. 2. Define HIPAA and HITECH. Wh ...

Instructionschoose one of the scenarios below a or b to

Instructions Choose one of the scenarios below (A or B) to complete the assignment. Scenario A You are the business owner of a local small engine repair shop, and you have been thinking about implementing a knowledge man ...

The it department of your company has begun to appreciate

The IT department of your company has begun to appreciate that its projects do not exist in a business vacuum. That is, your company must also commit resources to operations, shareholder returns, and non-IT projects for ...

Assignment 1resource read ch 3 to 4 of the spirit catches

Assignment 1 Resource: read Ch. 3 to 4 of The Spirit Catches You and You Fall Down. After reading the article write a 175- to 265-word response to the following: do publicly funded health care programs overrule cultural ...

Discussion your task is to compare and contrast the

Discussion : Your task is to compare and contrast the different approaches and techniques that can be used to secure both planes (control plane and the management plane) of a Cisco device. Also answer the question of whe ...

Question how are authentication and authorization alike and

Question : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two? Please write minimum of 200 words with 0 % plagiarism.

Question in roughly 200 words - explain what social

Question : In roughly 200 words - Explain what social engineering is, and discuss how organizations can recognize social engineering and reduce the risks associated with it. The response must be typed, single spaced, mus ...

Question - are ltc beds the only place to put us are there

Question - Are LTC beds the only place to put us? Are there other alternatives that are more cost-efficient? Given issues of quality -- either perceived or actual -- in many LTCs, do we really even want to keep tradition ...

Assignmentsuppose your college or organization is

Assignment Suppose your college or organization is considering a new project to develop an information system that would allow all employees, students, and customers to access and maintain their own human resources infor ...

1 discussion questionsearch scholar google for a company

1. Discussion Question Search "scholar google" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes wer ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As