Government agencies, corporations, universities and small businesses are now tasked with performing risk assessments to determine the
Question:
Government agencies, corporations, universities and small businesses are now tasked with performing risk assessments to determine the level of cybersecurity vulnerabilities for networks, intellectual property, personnel and more. The process of performing these risk assessments can ensure that an agency or company has identified the risk level, mitigated potential threats and implemented options to protect assets.
Imagine you are a member of your law enforcement agency’s Risk Assessment Team tasked to complete a risk assessment.
Information | Threats | Vulnerability | Risk Level | Community Cost | |
Provide a list of at least ten information assets for a law enforcement agency in this column. Examples are: personnel records, 911 Calls for Service database, Arrest database, etc. | Please identify at least two threats to each of the information assets in the first column. As noted in the article, the possible threats are as follows: mobile, natural, internal, physical, social, malicious and network. Explain each threat. | Please identify any vulnerabilities that may cause the information asset to be compromised or exposed. (Provide at least two.) | Please identify the probability that the information asset will be targeted. The potential risk levels are: low, medium and high. | Please identify the cost to the community, if the information asset is accessed, stolen or compromised. | |
Information Asset 1 | |||||
Information Asset 2 | |||||
Information Asset 3 | |||||
Information Asset 4 | |||||
Information Asset 5 | |||||
Information Asset 6 | |||||
Information Asset 7 | |||||
Information Asset 8 | |||||
Information Asset 9 | |||||
Information Asset 10 |
Electronic Devices and Circuit Theory
ISBN: 978-0135026496
10th edition
Authors: Robert L. Boylestad, Louis Nashelsky