Description
Written Assignment:
Task 1: In approximately 350 words, answer the question below. Follow APA guidelines.
Question:Relative to STRIDE, which aspect (i.e. Spoofing, Tampering, Repudiation, etc) can be effectively addressed using the "wait and see" approach and yet still not expose a system to more risk.
Hello I need help with 2 tasks below:
Task 2: Please write at-least two paragraphs, write discussion on question below. Follow APA guidelines.
Question: Make an argument for or against custom threat mitigation approaches versus standard threat mitigation approaches.
Note: I need two separate documents for both the tasks and please mentioned References for both the task 1 and task 2.
Explanation & Answer
Attached.
Running head: MITIGATION APPROACHES
Mitigation Approaches
Students Name
Institution Name
1
MITIGATION APPROACHES
2
Every business may have various approaches to ensuring security and since not all business
threats can or may be eliminated with the use of standard threat mitigation the customized threat
mitigation approach is heavily preferred since the customized approach is essential for the
mitigation of significant threats. For small to medium sized businesses the standard threat
mitigation approach is preferred over the customer one since due to size the small businesses are
subject to relying upon a standard routine on a daily basis. However, I do not believe that the
conventional method caters for emergency situations most especially if the business has to deal
with cyber-attacks.
The custom...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
The Nightingale
by Kristin Hannah
The Girl With The Dragon Tattoo
by Stieg Larsson
All Quiet on the Western Front
by Erich Maria Remarque
The Second Sex
by Simone de Beauvoir
Mockingjay
by Suzanne Collins
Daisy Miller
by Henry James
Fear - Trump in the White House
by Bob Woodward
Dracula
by Bram Stoker