Do threats change over time? Why or why not? Threats change over time due to a variety of reasons. As we all know, technology evolves at such a fast rate that it is often challenging to keep up. To better explain, I recently built two new computers (one […]
NIST Special Publication 800-30 Revision 1, Guide for Conducting Risk Assessments, offers an overview of the many methods in performing risk assessments, mitigating risks, and a summary of how risk management applies to the System Development Life Cycle (SDLC). The article is widely used for assistance in conducting […]
For this assignment, we are tasked with conducting an asset identification and analysis on Harry and Mae’s Inc.’s assets; this is a vital first step in the risk assessment process. By carefully extracting each identifiable piece of hardware, software, or other property, I created a chart that lists […]
You must be logged in to post a comment.