Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Lab Project 20.2 table similar to that in You have just completed a qualitative

ID: 3811507 • Letter: L

Question

Lab Project 20.2 table similar to that in You have just completed a qualitative threat place the threats in a 3-by-3 should you take assessment of the computer security of your Figure 20.5. Which of the threats and which organization, with the impacts and probabilities action on, which should you monitor, occurrence listed in the table that follows. of ones may not need your immediate attention? Probability of occurrence Impact Threat High High Virus attacks High Medium Internet hacks Medium High Disgruntled employee hacks Medium Medium Weak incidence response mechanisms Low Theft of information by a trusted third-party contractor High Medium Low Low Competitor hacks Inadvertent release of noncritical information Low 633

Explanation / Answer

The threats on which the action is to be taken are:

Virus attacks- As the probability of occurence in this threat is high and the impact that this is gonna put when occured is also high thus causing a lot of loss and damage to the organization.

Internet Hacks- As the probability of the ocuurence is High and the imapact is medium that means once occured may lead to damage to the organiztion.

This high probabilty of occurence specifies that the chances of occurence of the threats falling in this category are very high. Therefore, the actions must be taken on them quickly to avoid a loss or damage to the organization.

The threats to be monitored are:

Disgruntled Employee Hacks- As the probabilty of occurence of this attack is Medium and once occured can cause huge amount of damage to the organization. So one should continuously look on to them and keeps a track of them so that as soon as the situation is found to have occured one can quickly take actions to solve them.


Weak incidence response mechanism-

As the probabilty of occurence of this attack is Medium and once occured can cause a good amount of damage to the organization. So one should continuously look on to them and keeps a track of them so that as soon as the situation is found to have occured one can quickly take actions to solve them and prevent the firm from any kind of loss.

Competitor Hackers- This threat should be monitored all the time, as the impact of this threat is very High on the organization. Though the probability of occurence is low but once occured can cause a huge loss to the firm in terms of information loss, unauthorised transactions etc.

The threats which not need immediate attention are:

Theft of information by a trusted third- party contractor- As their impact is low on the organizations, so even if it occurs, it doesnt affect the organixation that much. Therefore this threat can be left without any action and attention for a while and can be taken care of later.

Inadvertent release of noncritical information- As the chances of occurence & impact of this threat is low, therefore , this threat can be left for later which means that one need not to pay attention on to them for now. One can deal with them later