Description
6-2 Scenario Assignment Module Six: Gathering Quantities Data
In your role as a highly paid consultant, you are given a list of potential threats to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation.
For additional details, please refer to the Scenario Assignment Module Six Guidelines and Rubric document in the Assignment Guidelines and Rubrics section of the course.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Surname 1
Contents
Gathering Quantities Data..............................................................Error! Bookmark not defined.
Works Cited ...................................................................................Error! Bookmark not defined.
Surname 1
Student’s Name
Professor’s Name
Course Title and Code
Date of Submission
Gathering Quantities Data
Early in 2016, Desmond Schmidt and his colleagues took a survey on Global Navigation
on Satellite System (GNSS) spoofing attacks and came up with conclusions on exact nature of
threat scenarios, the effectiveness of proposed defense against such spoofing and practical
impediments highly that are, in most cases, ignored that allow GNSS spoofing attacks. In their
analysis, they suggest that spoofing has potential to attack Smart Grip power management
systems among other mobile phone infrastructure systems. They also stated that in most cases,
companies ignore the relevance of installing GNSS anti-spoofing jammers, which are reasonably
costly at the expense of their largely complex systems, and highlighted that it is important to
have more than just jammers in order to secure systems with...