Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Homework Help/Study Tips Expert

Respond to the following discussions from classmates (X2) with approximately 100 words or more each. Include a reference to each response. Be thoughtful and insightful and it must demonstrate critical thinking and analysis.

1.Thanks for your post and feedback, good note in that: When assessing risk using the qualitative method, one of the challenges that arise is defining the rating scale.

For example, a scale can be created in the interval of most likely for the events which occur all the time, likely for events which are in high rate, occasional for irregular events and unlikely for events which rarely occur.

This intervals gives room for inaccuracy and error because it might be difficult to differentiate the events in a consistent manner. There is no objective method to classify the relentlessness of events which have uncertain magnitudes. Also the differentiation of the events depends on individual judgement hence may be subjected to misjudgment

Further, in risk assessment a quantitative approach determines the associated costs of risks or threats and ways to mitigate those costs to your organization if the calculated event occurs.

Another consideration is the cost of preventing risks identified. With a quantitative approach it is relatively easy to track analysis which facilitates justification of the subsequent decisions. In contrast its results can produce greater error margins, and it is not easy to attach monetary values to historical items like reputations. In this method historical information is paramount to accuracy. Your thoughts?

2.Thanks for your post, good note in that: By using SVA an organization can identify the threats and develop possible ways of securing the systems and prevent them from occurring.

Another situation is in the case of software vendors in the software companies. They develop software and they have to use SVA to identify any potential threats because the software is subject to human errors, or even they can be hacked or accessed by unauthorized persons. Therefore, SVA will be useful in identifying any threats which might arise in the software development and also ensure that they are secure.

Also, consider that An SVA or a Security Vulnerability Assessment is more so for the reason of assessing holes in the current setup which is implemented or will be. For instance, computer networks can have vulnerabilities which hack can exploit.

A buildings security can have vulnerabilities allowing for break ins or work place violence, i.e. active shooter, etc. Another circumstance is looking at a building and how it can withstand a hurricane given what it already has windows, doors, or glass, and the like. So, basically how vulnerable is the building? Thoughts?

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M92549850
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Homework Help/Study Tips

Sociology - sociology of the familyshort answer

Sociology - Sociology of the Family Short Answer Questions Please answer questions in complete sentences on separate paper, typed, double-spaced. Be brief, using 1 - 2 sentences, and to-the-point. Sociological Theories o ...

Instructions discussion postdiscussion negotiation and

Instructions Discussion post Discussion: Negotiation and Doing Business in the Middle East For this week's discussion: Research and report on a global business leader or a political figure. What is his/her approach to ne ...

Questions -q1 compute the two-dimensional continuous-space

Questions - Q1. Compute the two-dimensional continuous-space Fourier transform of the following signal: The two-dimensional zero-one function p A (x, y) where A is an elliptical region, with semi-minor axis X and semi-ma ...

Write a two page paper that discusses what policies were

Write a two page paper that discusses what policies were missing in the below particular case. Do additional research than what was provided in the text. Use APA format. Cite your sources. Public Sector : - - State of Te ...

Question some large coal-burning power plants are located

Question: Some large coal-burning power plants are located at the mouth of a mine and have been designed to burn coal specifically extracted from that mine. Others are at a distance from mines. Coal can reach them by rai ...

Question is it ethical for a potential employer to use the

Question: Is it ethical for a potential employer to use the Internet this way? Is it legal? What if an angry ex-boyfriend or ex-girlfriend posted some things, pretending to be you? How might this affect your chances for ...

Quesiton every profession has a code of ethics that guides

Quesiton: Every profession has a code of ethics that guides professional behavior. In social work, the NASW Code of Ethics guides the behavior and decision-making practices of social workers. It is important that the the ...

Why is it necessary to ask patients with migraine if they

Why is it necessary to ask patients with migraine if they have any tingling or numbness anywhere?

Assignment after reading the material for the module

Assignment After reading the material for the module, conduct a search .Find information on the pros and cons of debt financing. Address the following questions : • Is debt necessary? • Is short term debt better or worse ...

Ethical hacking and defenceassignment taskyou are to

Ethical Hacking and Defence Assignment Task You are to infiltrate the provided system and attain root level privileges. Additionally there are five flags, these flags are represented as values and are awarded at each poi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As