Consider the risk to "integrity of customer and financial data files on system" from "corruption of these files due to import of a worm/virus onto a system

computer science

Description

Understanding Risk Assessment Methodology

Consider the risk to "integrity of customer and financial data files on system" from "corruption of these files due to import of a worm/virus onto a system," as discussed in Problem 14.2 in your textbook. From the list shown in Table 15.3 in your textbook, select some suitable specific controls that could reduce this risk. Indicate which you believe would be most cost effective. Support your answers with references.

Your well-written paper should meet the following requirements:

APA

  • Paper length: 2-3 pages
  • Include an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.
  • Include two external, scholarly references in addition to the textbook. Do not use blogs, wikis, or other non-scholarly sources.


14.3 - Rating : Consequence

1:Insignificant
2:Minor
3:Moderate
4:Major
5:Catastrophic
6:Doomsday

15.3-Security Controls

Access control
Awareness training
Audit and Accountability
Security assessment and authorization
Configuration Management
Contingency Planning
Identification and Authentication
Incident Response
Maintenance
Media Protection
Physical and Environmental Protection
Planning
Personnel Security
Risk Assessment
System and Services Acquisition
System and Communication Protection
System and Informational integrity
Program Management


Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.