Security weaknesses – You must choose two from the following three areas:

hardware
software
policy (excluding password policies)
and identify an item that requires improved security. To clarify: you must identify

a) one hardware and one software weakness or,
b) one hardware and one policy weakness or,
c) one software and one policy weakness.

You must define the asset or policy with sufficient detail to justify your assessment. Your assessment must include:

the vulnerability associated with the asset or policy
the possible threats against the asset or policy
the likelihood that the threat will occur (risk)
the consequences to mission critical business processes should the threat occur
how the organization’s competitive edge will be affected should the threat occur

Sample Solution

This question has been answered.

Get Answer