Cyber Security Management This task supporting documents and template in below link, https://drive.google.com/drive/folders/1FNxqgxvgcc6L5Ryh6jmib4RUwACLOz3t?usp=sharing Q1. Comparison and contrast between 2 contemporary approaches to cyber security risk management. Q2. Descriptions and examples of the common elements contained within approaches to cyber security
Cyber Security Management
This task supporting documents and template in below link,
https://drive.google.com/drive/folders/1FNxqgxvgcc6L5Ryh6jmib4RUwACLOz3t?usp=sharing
Q1. Comparison and contrast
between 2 contemporary approaches to cyber security risk management.
Q2. Descriptions and examples
of the common elements contained within approaches to cyber security risk
management.
Q3. Explanation of how
quantitative and qualitative risk assessment could apply to the scenario.
Q4. Justification of selected
approach to cyber security risk management for given organisation.
Q5. Example(s) of assets,
threats, impacts and controls that apply to the provided scenario.
(i) Identification
of Transcon's 4 most valuable assets; Use section '5 Solution Architecture' or
section '6 Infrastructure Components' of the SAD to determine assets. Clearly
state where these assets are referred to in the SAD using the asset
classification table. Then you will need to act on behalf of Transcon as the
asset owner to classify these for Transcon to complete the table.
(ii) Apply
Weighted Factor Analysis (WFA) to determine relative value of Transcon assets.
Use table 5 to list Transcon assets to be prioritized.
Calculate relative importance of each asset using WFA
Criteria, weights and impacts on which to prioritise the assets
are as follows:
(iii) Perform
Threat identification
Identify a maximum of 4 threats for each of the assets and
determine the category each threat belongs to using slide 39 of Week 4 Lecture.
(iv) Perform
Vulnerability identification
Identify one vulnerability for each threat from table 6 and
record in table 7 to complete TVA worksheet.
References
Trending now
This is a popular solution!
Step by step
Solved in 2 steps