Identify the three most likely threats to an office computing system with less than ten employees by identifying the three most likely vulnerabilities to be exploited. Estimate the number of times each vulnerability is exploited per year. List the assets that might be affected by these vulnerabilities and calculate an estimate of the Annualized Loss Expectancy (ALE) for each asset? Justify your answer.
Related Posts
Question 1 Janet Brown is 45 and divorced. She has two children who live with her and are dependent on her. Stephen is 12. Sarah is 17 and has been certified as eligible for the disability credit. Janet’s financial information for 2019 and 2020 includes the following: 2020 2019 Salary and taxable benefits $105,000 $100,000 Car expenses deducted in computing employment income
Uncategorized / By
Scenario: You are employed by Pacific IT Solutions as a solutions integrator. Your job description is to implement IT solutions and provide customer support. One of your long-time customers, Western Mining, has their head office in Sydney and is opening a branch office in Brisbane. You have been contracted to setup the network. A meeting has been held to start the project. The minutes of the meeting are as follows:
Uncategorized / By