Assignment And Discussion

User Generated

enwh1720

Computer Science

Description

Written Assignment:

Task 1: In approximately 350 words, answer the question below. Follow APA guidelines.

Question:Relative to STRIDE, which aspect (i.e. Spoofing, Tampering, Repudiation, etc) can be effectively addressed using the "wait and see" approach and yet still not expose a system to more risk.


Hello I need help with 2 tasks below:

Task 2: Please write at-least two paragraphs, write discussion on question below. Follow APA guidelines.

Question: Make an argument for or against custom threat mitigation approaches versus standard threat mitigation approaches.

Note: I need two separate documents for both the tasks and please mentioned References for both the task 1 and task 2.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: MITIGATION APPROACHES

Mitigation Approaches
Students Name
Institution Name

1

MITIGATION APPROACHES

2

Every business may have various approaches to ensuring security and since not all business
threats can or may be eliminated with the use of standard threat mitigation the customized threat
mitigation approach is heavily preferred since the customized approach is essential for the
mitigation of significant threats. For small to medium sized businesses the standard threat
mitigation approach is preferred over the customer one since due to size the small businesses are
subject to relying upon a standard routine on a daily basis. However, I do not believe that the
conventional method caters for emergency situations most especially if the business has to deal
with cyber-attacks.
The custom...


Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags