Associate Level Material
Appendix
G
Security Assessment
Directions
Choose two settings from Ch. 9 of the text
and list each setting. Then, complete the following tables. List five threats
appropriate to the environment from the setting you chose. Rate the risk for
each threat from 0 (low) to 10 (high). Then, list five appropriate
countermeasures, including at least two countermeasures specific to physical
security and one countermeasure specific to personnel and security management.
Once you have completed the tables, write a brief explanation of each countermeasure,
stating how the countermeasure reduces the risk associated with that threat.
Setting
1:
THREAT
|
RISK
|
COUNTERMEASURE
|
||
Probability
|
Criticality
|
Total
|
||
Example:
Information
theft
|
4
|
7
|
11
|
Employee
screening, limited computer access, and computer monitoring
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Setting
2:
THREAT
|
RISK
|
COUNTERMEASURE
|
||
Probability
|
Criticality
|
Total
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
No comments:
Post a Comment