A)
Discussion Forum 5: Security Controls Address Risk
1) In Discussion Forum 5, post your response to the following discussion topic. Reply to at least two classmates’ responses and shares informative URLs by the date indicated in the Course Calendar. Your discussion question response should be at least 200 Words, with another 50 words per reply.
Risk is defined as the probability that a threat will be realized. You can calculate the expected loss by multiplying the risk probability by the asset cost. Based on your own experience, which of the following security review activities (Monitor, Audit, Improve, and Secure from page 218 of the book Fundamentals of Information Systems Security) do you feel should receive the most resources? Explain why.
2) Respond to at least two other students (at least 50 words each )!
Respond to two (2) students/Peers (two classmates). The responses should be at least 50 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response should not be to a peer already responded to more than twice.
B). Part 1: What is the difference between Qualitative and Quantitative Risk Assessments? Give an example of each.
Part 2: In week 8, each student will complete a project on vulnerabilities. Identify any three vulnerabilities that you have discovered and want to research about. Include pictures if possible.
Part 3: In simple and brief sentences, answer the following:
How susceptible are our systems to external threats such as cyberattacks or malware due to identified vulnerabilities?
Are there any weaknesses in our physical security measures that could be exploited by unauthorized individuals?
How effectively are we addressing vulnerabilities introduced by third-party vendors or partners who have access to our systems or data?