303303
custom essay writing service
1. Determine three additional Intangible Assets that apply to business diagram provided. Add them to the end of the list of Assets on the Lists tab of the workbook.
2. On the Lists Tab, scroll down to the Metrics section. Give each value (high, medium, low) meaning. This is subjective, but should be justifiable. I may ask you to defend your choice.
3. Still on the Lists Tab, scroll up to the prepared Threat Lists. Add two additional threats to each of C I and A that are relevant to the grading system you are assessing for risk.
4. Populate the Asset/ threat columns with at least 5 threats for each of the assets Asset. Use at least one from each of C I A. (You should know which assets are not susceptible to all of CIA)
5. For each Asset/Threat pair, fill out the rest of the columns. In particular for Vulnerability selection use step 6.
6. For vulnerability identification, use the key word search feature of the US National Vulnerability Database (NVD) to find vulnerabilities that apply to each Asset/Threat. For each A/T pair, select a vulnerability with the highest rating on NVD. For each Asset / threat pair, fill out the rest of the remaining columns.
This is property of essay help USA. We provide the best online research help to individuals needing our assistance. Log in for Research paper writing help