[Lecture 2] The probability of a successful attack depends on activated threat and vulnerability. Select one: O True O False

A First Course in Probability (10th Edition)
10th Edition
ISBN:9780134753119
Author:Sheldon Ross
Publisher:Sheldon Ross
Chapter1: Combinatorial Analysis
Section: Chapter Questions
Problem 1.1P: a. How many different 7-place license plates are possible if the first 2 places are for letters and...
icon
Related questions
Question

PLEASE ANSWER ASAP!! 

[Lecture 2] The probability of a successful attack depends on activated threat and vulnerability.
Select one:
O True
O False
Transcribed Image Text:[Lecture 2] The probability of a successful attack depends on activated threat and vulnerability. Select one: O True O False
[Lecture 2] The risk equation is: R = Tx V x C, where, R is the estimated risk, T is the
probability for a threat to be activated, V is the existence of vulnerabilities, and C is the cost of
damage if the attack is successful.
Consider a situation where MacOS has a privilege escalation vulnerability which can
eventually cause a damage of $75,000. Calculate the risk for a Windows OS user for this
vulnerability. Show the values of each variable in the risk equation.
Answer:
Transcribed Image Text:[Lecture 2] The risk equation is: R = Tx V x C, where, R is the estimated risk, T is the probability for a threat to be activated, V is the existence of vulnerabilities, and C is the cost of damage if the attack is successful. Consider a situation where MacOS has a privilege escalation vulnerability which can eventually cause a damage of $75,000. Calculate the risk for a Windows OS user for this vulnerability. Show the values of each variable in the risk equation. Answer:
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer