Briefly explain how to perform a risk assessment.

What will be an ideal response?


Determining the damage from an attack first requires a realistic look at several types of attacks that may occur, such as denial of service, wireless packet sniffing, access to unsecured WLAN management interfaces, and even social engineering. Then, based on the vulnerabilities recognized in the vulnerability appraisal, an analysis of the impact can be determined. Not all vulnerabilities pose a significant risk; with some vulnerabilities the risk may be minor. One way to determine the severity of a risk is to gauge the impact the vulnerability may have on the organization if it is exploited.

Computer Science & Information Technology

You might also like to view...

You can click the Line button on the ____ tab to draw a line on a report.

A. Standard B. Formatting C. Toolbox D. Design

Computer Science & Information Technology

For security reasons, you should _________________________ of your Microsoft account when you are finished using a public or shared computer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Notice that BGP transmits messages over TCP connections. What is a reason that BGP uses TCP to transmit its messages?

What will be an ideal response?

Computer Science & Information Technology

SharePoint ________ can be lists, libraries, site templates, and custom solutions

Fill in the blank(s) with correct word

Computer Science & Information Technology