+1(978)310-4246 credencewriters@gmail.com

Use the risk assessment process  to conduct a preliminary assessment on the information security at your home.InstructionsThe assessment report should include the following:1)     Purpose, scope, assumptions, and constraint associated with the assessment.2)     Risk assessment approach used and information assets to be protected.3)     Threat sources– you may the appendix tables in the risk assessment guide document on to identify threat sources, as well as completion of table in item #4.4)     Risk rating tableAssetVulnerabilityLikelihoodImpactRisk rating factorNote: 1) risk rating factor = likelihood * impact 2) you need to define the range of the number range used in the table. For example, if you impact is 1-5, what does 1 mean and what does 5 mean.5)     A summary of assessment and ways to mitigate the risk identified.

error: Content is protected !!