Access Millions of academic & study documents

Part B 1

Content type
User Generated
Subject
Law
School
University of Maine
Type
Homework
Showing Page:
1/4
1
Assets, Threats, Vulnerabilities
Student’s Name
Professor’s name
Institution
Course code
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
2
Assume you've been assigned to a risk assessment project team that is responsible for
identifying critical organizational assets that would have a significant negative impact on
the organization’s mission.
Technology has significantly helped in enhancing performance and productivity in
organizations. Although technology has numerous benefits for both individuals and
organizations it also has its drawbacks. One of the drawbacks is cyberattacks on the critical
infrastructure of organizations leading to disruption of work.
The critical asset I have selected for our organization is the customers’ Personal
Identifiable Information. Our company holds a huge amount of customers’ data it is our
responsibility to protect against unauthorized parties from accessing it. If at any point this
information is lost to cyber criminals it will lead to more damage to the company’s image and
finances. The government requires all companies holding customers’ critical information to
adopt rigid cybersecurity measures to protect the data from outsiders (Calder, 2007).
A threat is anything that could damage or steal the data or create any kind of business
disruption. Our company is faced with various threats which could lead to the loss of the critical
assets that we hold. Some of the threats include; malware, ransomware, phishing attacks, or
employees (Haber & Hibbert, 2018). A vulnerability is any weakness that can be exploited by an
attacker to gain access to restricted data. This can be employees, publicly placed infrastructure,
or processes and procedures (Haber & Hibbert, 2018).

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
Showing Page:
4/4

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
1 Assets, Threats, Vulnerabilities Student’s Name Professor’s name Institution Course code Date 2 Assume you've been assigned to a risk assessment project team that is responsible for identifying critical organizational assets that would have a significant negative impact on the organization’s mission. Technology has significantly helped in enhancing performance and productivity in organizations. Although technology has numerous benefits for both individuals and organizations it also has its drawbacks. One of the drawbacks is cyberattacks on the critical infrastructure of organizations leading to disruption of work. The critical asset I have selected for our organization is the customers’ Personal Identifiable Information. Our company holds a huge amount of customers’ data it is our responsibility to protect against unauthorized parties from accessing it. If at any point this information is lost to cyber criminals it will lead to more damage to the company’s image and finances. The government requires all companies holding customers’ critical information to adopt rigid cybersecurity measures to protect the data from outsiders (Calder, 2007). A threat is anything ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents