Wk5_490

profileBandos051814

Need help with a question.

  • 5 months ago
  • 30
files (1)

Wk5_490.docx

Risk mitigation strategies will provide the backdrop for cybersecurity execution processes. You have analyzed how vulnerability management programs protect organizations.

Create a 2- to 3-page Risk Analysis Report using Microsoft® Word detailing the following:

· Summarize incident response plans for 2 attack scenarios.

· Assess the ethical implications of these attacks.

· What are some of the key elements of a risk assessment?

· Are there mitigating controls that should be included to reduce the specific risk, and what might a mitigating control look like for a specific threat?

· Justify the use and placement of a firewall.

· Comment on security measures that can be deployed in a network to detect and stop potential threats, with a focus on IDS and IPS.

Cite any sources to support your assignment.

Format your citations according to APA guidelines.