Assessing Security Controls and Risk

Question # 00848709 Posted By: wildcraft Updated on: 12/15/2023 08:15 PM Due on: 12/16/2023
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

Assessing Security Controls and Risk

Based on the Assignment Scenario, determine the risk associated with the vulnerabilities. Use NIST SP 800-30 to calculate the risks for each vulnerability.

Part 1 – Report Risk

Develop a 2- to -3-page Security Assessment Report (SAR) using the Wk 4 Assignment Template . The Security Assessment Report (SAR) should include the following for each vulnerability:

· Vulnerability title

· A precise vulnerability description

· Likelihood

· Impact

· Overall risk level

· Logical recommendations for mitigation

Part 2 – Communicate the Risk to Leadership

Develop a 10- to 12-slide Microsoft® PowerPoint® presentation documenting the risks for each vulnerability to be presented to the leadership of Health Coverage Associates.

The presentation should include:

· An introduction slide

· A description of each of the three vulnerabilities

· An accurate illustration of the NIST SP-30 5x5 matrices

· A description of the likelihood and impact, with a justification of that determination (e.g., very low, low, moderate, high, very high)

· An illustration of the overall, high watermark level of risk (e.g., very low, low, moderate, high, very high)

· A logical recommendation for mitigation actions, including an explanation of risk tolerance and risk acceptance for the organization

· A conclusion slide

· Detailed speaker notes

Be sure to include supportive graphics and appropriate backgrounds and styles. All references need to adhere to APA guidelines. Images should not be copied, unless author permission is obtained or copyright-free images are used.

 

Note: Other applications like Adobe® Spark® or Microsoft® Sway® or Mix can be used instead of Microsoft® PowerPoint®. 

Dot Image
Tutorials for this Question
  1. Tutorial # 00844171 Posted By: wildcraft Posted on: 12/15/2023 08:16 PM
    Puchased By: 2
    Tutorial Preview
    The solution of Assessing Security Controls and Risk...
    Attachments
    Assessing_Security_Controls_and_Risk.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa