University of The Cumberlands Security Architecture & Design Discussion Questions

User Generated

ogbsb

Computer Science

University of the Cumberlands

Description

Subject: Security Architecture & Design 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples 

Faced with the need to deliver risk ratings for your organization, you will have to substitute the organization’s risk preferences for your own. For, indeed, it is the organization’s risk tolerance that the assessment is trying to achieve, not each assessor’s personal risk preferences

1.What is the risk posture for each particular system as it contributes to the overall risk posture of the organization?
2. How does each attack surface – its protections if any, in the presence (or absence) of active threat agents and their capabilities, methods, and goals through each situation—add up to a system’s particular risk posture?
3.In addition, how do all the systems’ risks sum up to an organization’s computer security risk posture?

 

Explanation & Answer:
600 words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: INFORMATION RISK MANAGEMENT

Discussion Questions
Student’s Name
Institutional Affiliation

1

INFORMATION RISK MANAGEMENT

2

Discussion Questions
What is the risk posture for each particular system as it contributes to the overall risk
posture of the organization?
The security posture of the overall organization is highly determined by the individual
security posture of all the systems. If the security posture, for instance, of the hardware systems,
is compromised, there are high chances that the whole organization might be at a high risk of an
information security breach, and the associated impacts (Amoroso, 2011). Therefore, it is critical
to have an awareness of the security postures of all the relatable systems within an organization.
The following are some of the possible risk postures for each particular order and how they
contribute to the overall risk posture of the organization.
First, the level of information regarding the pertinent exposures from service providers,
vendors, and the hacking co...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags