Computer Science > Report > CYBERSECUR CYB5DNS ASSESSMENT 3_Mitigation Plan for Threat Report (All)
MIS607 Cybersecurity Mitigation Plan for Threat Report Student ID: 00325462TTable of Contents 1. Introduction........................................................................................ ..................................................2 2. Main discussion.................................................................................................................................3 2.1 Threat identification....................................................................................................................3 2.2 Case study threat model..............................................................................................................5 2.3 Likely hood of the threat occurrence...........................................................................................5 2.4 Consequences of the threats.......................................................................................................6 2.5 Level of the threats......................................................................................................................7 3. Threat mitigation techniques.............................................................................................................8 4. Recommendations to the CEO...........................................................................................................9 4.1 Risk management........................................................................................................................9 4.2 Key issues of the Process improvement model...........................................................................9 4.3 Road map..................................................................................................................................10 Conclusion...........................................................................................................................................12 References...........................................................................................................................................13 List of Table Table 1:Threat likelihood.......................................................................................................................5 Table 2: Consequence table...................................................................................................................6 Table 3: Threat levels.............................................................................................................................7 Table 4: Risk level...................................................................................................................................7 List of Figure Figure 1: STRIDE.....................................................................................................................................4 Figure 2: Cyber security roadmap........................................................................................................11 11. Introduction The threat mitigation is the process that represents the strategy that is implemented to protect the organization network, software and hardware components form the cyber threats. As defined in the ca [Show More]
Last updated: 1 year ago
Preview 1 out of 14 pages
Connected school, study & course
About the document
Uploaded On
Aug 10, 2021
Number of pages
14
Written in
This document has been written for:
Uploaded
Aug 10, 2021
Downloads
0
Views
68
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·