Question

The unchecked Web application is a risk to the organization hosting the application and the users...

  1. The unchecked Web application is a risk to the organization hosting the application and the users that rely on the application in their daily lives. The risk of loss is real and no matter how much effort an organization puts into securing their environment, there is always some residual risk. So how should that residual risk be dealt with? Once identified, what step should be taken to deal with the residual risk? (SLO 2, 3, EOs, 2b, 3b)
  2. Network based attacks take advantage of vulnerabilities to expose a large number of devices to malicious users. List at least two different types of network attacks, describe what they are and the impact that it has on network users. (SLO 2, 3, EOs, 2b, 3b).
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. In order to deal with the residual risk, we have to, first of all, make the assessment of the risk. This means that we need to, first of all, see whether there would be a big impact due to this risk or not. Eliminating all the risks from the system is not possible. Thus if the risk is meniscal then we can let it remain and there would be no need to handle the risk.
Otherwise following are the ways in which we can handle the residual risk.

  1. If the risk is below the acceptable risk level then we can have it in the system.
  2. If the risk is above the acceptable risk level then we need to check for the risk and try to find the ways to mitigate the problem.
  3. If the risk is above the threshold level and it would be very costly to mitigate the problem and the cost would be greater than the attack then we can let it remain in the system.

Thus above is the way in which we can handle the residual risk.

Add a comment
Know the answer?
Add Answer to:
The unchecked Web application is a risk to the organization hosting the application and the users...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • Develop a case study analysis in the following format Relevance of the case study to my...

    Develop a case study analysis in the following format Relevance of the case study to my work environment - application - learning impact CASE 4-1 Tambrands Overcoming Cultural Resistance Tampax, Tambrands's only product, is the best-selling tampon in their virginity if they use a tampon. When they go to the beach in the world, with 44 pencent of the global market North America and tiny bikinis, tampons arent their choike. Instead, hordes of women Europe account for 90 percent of...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT