Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1.What is the risk management? Why in the den a vacation of risk and bought abil

ID: 3583388 • Letter: 1

Question

1.What is the risk management? Why in the den a vacation of risk and bought ability to add assets so important in risk management? 2. According to sun tzu,what do you key understanding must you achieve to be successful in the battle? 3.Who is responsible for risk management in an organization? Which community of interest usually takes the lead in information security risk management? 4. And risk management strategies, and why must periodic reviews be part of the process? 5. Why do networking components need more examination room and information security perspective then from a system development perspective? 6. What value does an automated asset inventory system have during risk identification? 7.what information attribute is often of great value for local networks that you static addressing? 8. When devising a classification scheme for systems components, is it more important that the asset identification list be comprehensive or mutually exclusive ? 9. What's the difference between an acid's ability to generate revenue and its ability to generate profit. 10. What are Vulnerabilities? How do you identify them? 1.What is the risk management? Why in the den a vacation of risk and bought ability to add assets so important in risk management? 2. According to sun tzu,what do you key understanding must you achieve to be successful in the battle? 3.Who is responsible for risk management in an organization? Which community of interest usually takes the lead in information security risk management? 4. And risk management strategies, and why must periodic reviews be part of the process? 5. Why do networking components need more examination room and information security perspective then from a system development perspective? 6. What value does an automated asset inventory system have during risk identification? 7.what information attribute is often of great value for local networks that you static addressing? 8. When devising a classification scheme for systems components, is it more important that the asset identification list be comprehensive or mutually exclusive ? 9. What's the difference between an acid's ability to generate revenue and its ability to generate profit. 10. What are Vulnerabilities? How do you identify them? 2. According to sun tzu,what do you key understanding must you achieve to be successful in the battle? 3.Who is responsible for risk management in an organization? Which community of interest usually takes the lead in information security risk management? 4. And risk management strategies, and why must periodic reviews be part of the process? 5. Why do networking components need more examination room and information security perspective then from a system development perspective? 6. What value does an automated asset inventory system have during risk identification? 7.what information attribute is often of great value for local networks that you static addressing? 8. When devising a classification scheme for systems components, is it more important that the asset identification list be comprehensive or mutually exclusive ? 9. What's the difference between an acid's ability to generate revenue and its ability to generate profit. 10. What are Vulnerabilities? How do you identify them?

Explanation / Answer

Answer :

Hi

The questions are many in numbers and the parts of some questions are not clear . I will be answering selective questions.
For better explanation and detailed answer i would suggest you to post the question one by one not in bulk.


1)Risk management: To make any project successful , the associated risk to be identified and mitigation plan to be prepared in advance.Risk Management comprises the analysis and evaluation of risk through processes of identification, description and estimation. Identified risks need to be displayed in a structured format and proper assessment to be done .


2) Question not clear


3) The three stakeholders are involved in risk management.

4) Risk management startegies :
Before we stategies the responses for each of the risks identified, it is necessary to determine the organisation’s attitude to risk or risk appetite.The risk appetite will be influenced by the size and type of organisation, its culture and its capacity to withstand the impacts of adverse occurrences. Responses to risk generally fall into the following categories:

Please note that there is no right response to risk.


10)

Vulnerabilities: In terms of network infrastructure , A vulnerability is a weak spot in your network that might be exploited by a security threat. You need to take special care to identify anything unknown about your network. suppose you have configured cisco type 7 password instead of type 5 for terminal access. hacker may exploit the plain text password and break into your network.You need to follow the best practices while configuring the network devices. Security audit is mandatory to identify existing vulnerability in your network.


Thanks