Briefly explain how to perform a risk assessment.
What will be an ideal response?
Determining the damage from an attack first requires a realistic look at several types of attacks that may occur, such as denial of service, wireless packet sniffing, access to unsecured WLAN management interfaces, and even social engineering. Then, based on the vulnerabilities recognized in the vulnerability appraisal, an analysis of the impact can be determined. Not all vulnerabilities pose a significant risk; with some vulnerabilities the risk may be minor. One way to determine the severity of a risk is to gauge the impact the vulnerability may have on the organization if it is exploited.
You might also like to view...
Which of the following exceptions is a checked exception?
a. ArithmeticException. b. IOException. c. RuntimeException. d. InputMismatchException.
Marking a word or phrase for indexing can only mark one instance of the word or phrase in the document
Indicate whether the statement is true or false
The advanced driver setting that allows configuration of the device's communication characteristics, such as speed, parity, and number of data bits, and is dependent on the requirements of the device connected to the communications port is called Port Settings
Indicate whether the statement is true or false
Using the __________ cipher you choose some number by which to shift each letter of a text
a. DC4 b. Caesar c. Multi-alphabet substitution d. ASCII