2019-01-21T09:46:55+00:00 Assignments

Discussion Assignment on Vulnerability, Threat and Risk

This paper concentrates on the primary theme of Discussion Assignment on Vulnerability, Threat and Risk in which you have to explain and evaluate its intricate aspects in detail. In addition to this, this paper has been reviewed and purchased by most of the students hence; it has been rated 4.8 points on the scale of 5 points. Besides, the price of this paper starts from £ 40. For more details and full access to the paper, please refer to the site.

Discussion Assignment on Vulnerability, Threat and Risk

Instructions:

5 questions:
1. After reading the discussion and definitions of risk, threat, vulnerability, and asset by S. K. Katsikas in Computer and Information Security Handbook, Chapter 53, p. 905, in your own words describe risks, threats, and vulnerabilities. Provide examples of each from your personal experience or from private industry or government. Do not divulge specific information that may identify or be harmful to the organization. 
2.What is a Zero Day Exploit? Describe the effects caused by one or more ZDEs that recently has been reported in news articles. Describe how ZDEs can be used to affect cybercrime, cyber espionage, and cyber terrorism.
3.Compare the methods and effects of cybercrimes versus traditional crimes that can be directed at the same targets. For example, how does the crime of hacking a bank`s computer system compare to physically robbing a bank? How does punishment for cybercrime compare to that of traditional crime? How do you think they should compare (i.e., should cybercrime be punished the same, more severely or less severely than traditional crime)? You are encouraged to include real examples from the past year that you can share with your fellow students.
4.Many cybersecurity professionals believe the likely application of "cyber terrorism" to be an asymmetric attack against some portion of this nation’s critical infrastructure. Supervisory control and data acquisition (SCADA) systems support portions of our critical infrastructure. Which SCADA-controlled critical infrastructure do you think to be a likely target and why? Who should be responsible for protecting that infrastructure and why? Would this vary based on whom the attacker is—a state actor, a nongovernment organization, or an individual?
5.What are some difficulties policy-makers face (at the U.S. national level) to make policy that gets the desired results to counter cybercrime? Does the public demand seriously effective policy to counter cybercrime (think credit card fraud or ID theft)? In your view, do current legislative efforts address cybercrime concerns adequately?

Content:

Discussion on Vulnerability, Threat and Risk Name Institute of Affiliation Date Discussion on Vulnerability, Threat and Risk Question One A threat is something with the ability to exploit a vulnerability, intentionally or accidentally, and result to damage, or destruction of an asset. One ensures that their property is protected against the threats. They can be natural, for example earthquakes, human threats which are mostly unintentional and environmental ones, for instance, pollution. Vulnerability entails a weaknesses or gaps in a security program which can be destroyed by threats to gain unsanctioned access to an asset. Also, it involves limitation or gap in our protection efforts. An example is Susceptibility to physical or emotional inju

...


0% Plagiarism Guaranteed & Custom Written, Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

Order Now

STILL NOT CONVINCED?

We've produced some samples of what you can expect from our Academic Writing Service - these are created by our writers to show you the kind of high-quality work you'll receive. Take a look for yourself!

View Our Samples

corona virus stop
FLAT 25% OFF ON EVERY ORDER.Use "FLAT25" as your promo code during checkout