Security Risks and Threats

Security Risks and Threats

 

Don't use plagiarized sources. Get Your Custom Essay on
Security Risks and Threats
Just from $13/Page
Order Essay
  • Many different threats can arise to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats may affect only 1 of these security risks (like confidentiality only), and other threats affect more than 1 or even all these risks
    Create a 1- to 2-page table in Microsoft Word identifying a minimum of 6 threats using the column headers and details below:
    • Threat
    • Threat to Type of Data
    • Confidentiality/Integrity/Availability
    • Mitigation Suggestion
    •  Within your table:
    • Identify relevant threats. List 1 per column.
    • Determine the type of data threatened (data-at-rest, data-in-transit, or processing). Identify the data type in the column.
    • Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column.
    • Describe the mitigation plan in 2 to 3 sentences in the column.

ORDER NOW »»

and taste our undisputed quality.