Lab Risk Management Week 9 Instructions For Each Item Below

Lab Risk Management Week 9instructions For Each Item Below Writ

Lab Risk Management Week 9instructions For Each Item Below Writ

For each asset listed below, identify the threat, vulnerability, and risk associated with it. Support your responses with appropriate explanations. After completing this assignment, save your file as a PDF and submit it as instructed. Use the provided class cover sheet for submission. Copy and paste the table into your document or recreate it as necessary.

Paper For Above instruction

Asset (1): Computer Servers

Threat: Unauthorized access or cyber-attack targeting server infrastructure.

Vulnerability: Unpatched security weaknesses in server operating systems and open network ports.

Risk: Potential data breaches, operational disruptions, and damage to organizational reputation due to hacking incidents.

Asset (2): Trade Secrets of a Company

Threat: Industrial espionage or insider theft.

Vulnerability: Lack of strict access controls and inadequate employee background checks.

Risk: Loss of competitive advantage and financial damage from stolen proprietary information.

Asset (3): Data Stored in the Cloud

Threat: Data breaches or unauthorized access by cybercriminals.

Vulnerability: Weak authentication methods and misconfigured cloud permissions.

Risk: Sensitive data exposure leading to privacy violations and regulatory penalties.

Asset (4): Critical Mission Software

Threat: Malware infection or ransomware attack.

Vulnerability: Outdated software versions and inadequate cybersecurity defenses.

Risk: Software malfunction or data loss impacting vital organizational operations.

Asset (5): Employees

Threat: Social engineering attacks such as phishing.

Vulnerability: Lack of employee cybersecurity awareness and training.

Risk: Credential theft and unauthorized system access, leading to internal security breaches.

Asset (6): Hardware Firewalls

Threat: Firewall configuration errors or attacks designed to bypass security.

Vulnerability: Misconfigured rules or outdated firmware.

Risk: Unauthorized network access and potential infiltration by threat actors.

References

  • Fogel, K. M., Carroll, M. D., Ogden, C. L., & Curtin, L. R. (2010). Prevalence and Trends in Obesity Among US Adults, 1999–2008. Journal of the American Medical Association, 235–241.
  • Centers for Disease Control and Prevention (CDC). (2008). Youth Risk Behavior Surveillance—United States, 2007. Morbidity & Mortality Weekly Report, 57(SS–4).
  • National Heart, Lung, and Blood Institute. (1998). Clinical Guidelines on the Identification, Evaluation, and Treatment of Overweight and Obesity in Adults. NIH Publication No. 98-4083.
  • Finkelstein, E. A., Trogdon, J. G., Cohen, J. W., & Dietz, W. (2009). Annual Medical Spending Attributable To Obesity: Payer- And Service-Specific Estimates. Health Affairs, 28(5), W822–W831.
  • Troiano, R. P., Berrigan, D., Dodd, K. W., Mâsse, L. C., Tilert, T., & McDowell, M. (2008). Physical activity in the United States measured by accelerometer. Medicine and Science in Sports and Exercise, 40(1), 181–8.
  • U.S. Department of Health and Human Services. (2008). 2008 Physical Activity Guidelines for Americans. DOI: 10.1037/e527052012-001.
  • National Center for Health Statistics. (2008). Chartbook on Trends in the Health of Americans. Health, United States, 2008.
  • Ogden, C. L., Carroll, M. D., Flegal, K. M. (2008). High Body Mass Index for Age Among US Children and Adolescents, 2003–2006. Journal of the American Medical Association, 299(20), 2401–2405.
  • Flegal, K. M., Graubard, B. I., Williamson, D. F., & Gail, M. H. (2007). Cause-Specific Excess Deaths Associated With Underweight, Overweight, and Obesity. Journal of the American Medical Association, 298(17), 2028–2037.
  • Centers for Disease Control and Prevention (CDC). (2017). National Health and Nutrition Examination Survey Data. Available at: https://www.cdc.gov/nchs/nhanes/index.htm