Question: Threat, Vulnerability, and Exploit Learning Objective: Explain key terms associated with risk management. Details: Assess risk based on the likelihood of adverse events and the

Threat, Vulnerability, and Exploit

Learning Objective:

  • Explain key terms associated with risk management.

Details:

Assess risk based on the likelihood of adverse events and the effects on information assets when events occur.

While watching the 57-minute video, Cybercrime: The Invisible Threat, from Films on Demand, take notes to identify and assess risks associated with the threats presented in the video. In at least two hundred fifty words, discuss ONE OF the following in your main post.

  1. Clearly define threat, vulnerability, and exploit as they relate to information assets. Describe an example of an asset that is different than one already posted in the forum.
  2. Introduce the term cybercrime and why IT professionals should be concerned about it. Conclude with your recommendation on how your organization can address these risks.
  3. Identify the threats/vulnerabilities presented in the video. Discuss if the threats are controllable. What part of risk management addresses these threats? Can they be quantified?

Video Link: https://digital-films-com.ezproxy.bellevue.edu/p_ViewVideo.aspx?xtid=11755

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!