: Explain key terms associated with risk management

User Generated

Evfxqrgragvba

Computer Science

Description

In at least 250 words, discuss the following in your main post.

  1. Clearly define threat, vulnerability, and exploit as they relate to information asset. Describe an example of an asset that is different than one already posted in the forum.
  2. Introduce the term cybercrime and why IT professionals should be concerned about it.
  3. Identify the threats/vulnerabilities presented in the video, Cybercrime: The Invisible Threat, from Films on Demand, and discuss whether the threats are controllable.
  4. What part of risk management addresses the threats such as those in the video? Can they be quantified? Should SETA come into play?



User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: RISK MANAGEMENT IN I.T

RISK MANAGEMENT IN I.T
Name
Course
Tutor
Date

1

RISK MANAGEMENT IN I.T

2

Risk management
Threat
Usually, a warning in information system represents an event that may or may not occur
but has the potential to cause severe damage or harm to the system as a whole or its components.
Hey, exploit existing vulnerabilities into full-scale attacks.
Vulnerability
The existence of a flaw in a system that could lead to an attack on the said system is
referred to as a vulnerability and is made up of three components. The components of
vulnerability are system flow, the ability of an intruder to access the flaw and the potential the
attacker has to ...


Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags