Identify a vulnerability that aligns with the threat event


Assignment

Prepare a WORD document, which will contain the final and Cybersecurity Risk Management Report for PPP Manufacturing.

Steps to Completion

A. Prepare a network diagram based on your interviews, reflecting your understanding of the PridePoint network in its current state. Include:

1. Zone boundaries
2. Connection points and links
3. Known security capabilities

B. Review the list of risk identified by the Director of Technology Operations. For each risk, based on your interviews:

1. Estimate the difficulty in detecting the threat event given current capabilities.
2. Identify a vulnerability that aligns with the threat event.
3. Summarise a possible consequence associated with the risk.

C. Select the most serious risk based on your assessment and your understanding of the enterprise risk appetite.

D. Based on the work that you have done in this case, how would you summarise the overall level of IT risk in your report to the CIO?

E. What are the benefits of providing an overall level of IT risk? Are there any downsides?

Format your assignment according to the give formatting requirements:

1. The answer must be double spaced, typed, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the course title, the student's name, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.

Request for Solution File

Ask an Expert for Answer!!
Other Subject: Identify a vulnerability that aligns with the threat event
Reference No:- TGS03102800

Expected delivery within 24 Hours