Saturday, June 15, 2019

Na Research Paper Example | Topics and Well Written Essays - 500 words

Na - Research Paper Example5. in short explain the difference between the qualitative and quantitative seek analysis processes. Qualitative risk analysis process is done through the use of questionnaires and workshops in order to calculate the relative values of assets while a quantitative risk analysis is done through assigning hard financial values to assets.6. Why is it so necessary to have a modify team with a variety of experiential and work- cogitate backgrounds for the RA? It is necessary to have a diversified team with a variety of experiential and work related background for the RA to be able to bring out their knowledge, experience and understanding about the assessment and to respond effectively to new dangers as they arise.7. a) Briefly describe how each selection below is a threat to a ne twainrk and b) list two vulnerability examples that you would look for/interview for when researching each. Do not provide the same vulnerability for more than one threat.The compute r software product will crash or will have system failure that results to software bug, power failure and malfunction of the system. The improper use of computers by humans and the system was not designed well are the vulnerability examples of this kind threat.They tooshie create a serious risk to information security. Using unauthorized personal devices such as USB on secure network and passing hole-and-corner(a) information over non secure method or system to get information are the vulnerability examples of this kind threat.This threat alters or removes information from files. not having policy restricting the provision of information by the staff of the phone and the system doesnt have a protected password are the two vulnerability examples of this kind threat.This threat slows down the computer and destroys the computer files. The software doesnt have anti-virus and the programs downloaded from the internet has malicious software in it are the two vulnerability examples of th is kind threat.This

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.