Saturday, 22 February 2014

Five threats appropriate to the environment from the setting you chose

Associate Level Material
Appendix G


Security Assessment

Directions

Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.
Setting 1:


THREAT

RISK

COUNTERMEASURE
Probability
Criticality
Total
Example:
Information theft

4

7

11

Employee screening, limited computer access, and computer monitoring



























Setting 2:


THREAT

RISK

COUNTERMEASURE
Probability
Criticality
Total




























No comments:

Post a Comment