WEEK 3 DISCUSSION# 2
ANSWER THE FOLLOWING
1: Why is threat modeling an important component of risk management?
2: Fully explain how to use one of the threat modeling tools
`Hey,
Note: If you have any queries related the answer please do comment. I would be very happy to resolve all your queries.
1)
Whether threat modeling is performed on an existing application or throughout the software development lifecycle it is an essential component in the risk management arsenal because it can help quantify and visualize the otherwise intangible threats an application carries. Threat modeling is not a trivial exercise and should be done with effort and precision so as not to miss any aspect of the attack surface applications expose.
Threat modeling is a powerful technique that helps to
characterize the higher level threat and separate it into more
manageable sub-threats that can be addressed.
From a business perspective, IT security exists only in the context
of risk management. Large corporations are driven by risk
management concerns including the risk of non-compliance, the risk
of data loss, and the risk of financial loss through IT theft,
legal sanctions, and infrastructure downtime.
Although vulnerabilities, hackers and exploits are compelling
reasons to focus on application security, they have been
overshadowed by compliance and risk issues in the minds of
corporate decision makers. The myriad of regulations and standards
are imposing stricter IT security requirements and application
security has reached a pinnacle of importance in the context of
regulatory compliance.
Risk management is a key requirement of many of these regulations
and is one of the most difficult processes to conduct and complete.
The difficulty lies in the fact that although the high-level threat
is generally well understood (breach of customer data, denial of
service etc.), the underlying causes and sub-threats that can lead
to it remain obscure
Note: Brother According to Chegg's policy we are only allowed to answer first part if there are many. So, I request you to post other part as separate posts.
Kindly revert for any queries
Thanks.
WEEK 3 DISCUSSION# 2 ANSWER THE FOLLOWING 1: Why is threat modeling an important component of...
WEEK 6 DISCUSSION 3 ANSWER TWO OF THE FOLLOWING QUESTIONS: 1: Why is it important for security leaders to understand their organization's budgeting and financial processes? 2: How does security deter and detect internal fraud in an organization? 3: The goals of all corporations are profits. How does a security work with this fact given that it's usually a cost center?
WEEK 1 DISCUSSION #2 ANSWER THE QUESTION BELOW: 1: Describe how an organization you've worked for or observed handles risk. Do they use a formal risk management process or tool? Or is it more ad-hoc, where risks are handled differently on a case-by-case basis?
WEEK 8 DISCUSSION ANSWER ANY TWO OF THE FOLLOWING QUESTIONS BELOW: 1: How do the security principles of prevention, deterrence, detection, delay, response, and recovery work together in establishing physical security? 2: Why is it important to protect the organization's utility services (power, water, gas, etc.) and environmental controls (HVAC)? Name one technique for improving security in this area. 3: How and why does the construction of a security facility make a difference in its security? Explain techniques for building...
Click on the words Week 7 Discussion to enter the Discussion Board for this week. Next, press "Create Threads" to begin your post. Discussion Board Main Post Provide 3 cxamples and explain fully on the following topics. (Number the examples and explain) Elderly drivers and health are a huge controversial topic amongst the aging population. Explain how and why they may be considered to be a hazard. In your discussion, tell what you feel the problems are with the elderly...
WEEK 4 DISCUSSION ANSWER ANY TWO OF THE FOLLOWING QUESTIONS BELOW: 1: What are the similarities and differences between risk threshold, risk sensitivity and risk exposure? 2: List and explain the steps for determining the risk appetite for an organization? 3: Who determines the risk appetite or threshold for an organization? How does this ordinarily occur?
WEEK 1 ASSIGNMENT ANSWER THE FOLLOWING QUESTIONS BELOW 1: Why is it important to understand threats? List and explain at least two reasons. 2: List at least five ways in which your vehicle is vulnerable to the threats. Explain your answers using complete sentences 3: Why is it important to understand vulnerabilities? List and explain at least two reasons
WEEK 12 DISCUSSION 1 ANSWER ANY TWO OF THE FOLLOWING BELOW: 1: What are the most prevalent trends regarding physical, operational, or personnel security? Explain 2 or 3. Why is this a trend? Include your source(s). 2: How is security going to be different in 5 years? While this is your prediction, make sure it's based on facts. Include your source(s). 3: How can metrics be used to persuade executive management to improve security? What metrics are useful and why?...
WEEK 6 DISCUSSION 2 ANSWER TWO OF THE FOLLOWING QUESTIONS: 1: Do private or not-for-profit organizations need to be concerned about auditing and fraud? Discuss the similarities and differences with public, for-profit companies. 2: Explain the importance of separation (or segregation) of duties in regards to financial and security controls. Provide additional examples. 3: Explain the different components of a financial balance sheet. Include how this is important for security.
1. What is Building Energy Modeling? Include in your answer discussion of: • Calculations that underlie a building energy model • Databases that are integrated in the model • Why zoning is important in constructing a building energy model • How energy models are used for code compliance and can be used to consider alternative designs.
Discussion Post 1. Why is the capital budgeting decision such an important process? 2. Why capital budgeting is more important than capital structure and working capital management?