Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/3

Click to flip

3 Cards in this Set

  • Front
  • Back

https://www.homeworkcapital.com/shop/cis-333-week-8-assignment-2-identifying-potential-risk-response-and-recovery/

CIS 333 Week 8 Assignment 2 – Identifying Potential Risk, Response and Recovery$30.00In Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities, you were recently hired as an Information Security Engineer for a videogame development company. After viewing a growing number of reports detailing malicious activity, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. He asked you to include a brief explanation of each item and the potential impact it could have on the organization.

www.homeworkcapital.com

After review of your report, the CIO requests that you develop a follow-up plan developing a strategy for dealing with all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk previously identified.

www.homeworkcapital.com

Write a four to five (4-5) page paper in which you:For each malicious attack and threat identified in Assignment 1, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).For each malicious attack and threat identified in Assignment 1, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.………………..Further details are hidden…