Question 1
Please respond to two contributions and provide feedback to a student’s response.
Provide two examples of how you have been impacted by someone else’s poor security measures. Please perform some basic research on each example – including twoadditional sources explaining the attack. Follow-up responses should either explain how the attack could have been prevented and identify the type of attackers (cyber criminals, script kiddies, brokers, insiders, cyberterrorists, hactivists, state-sponsored attackers, or unknown). If both of these questions have been answered, a response should explore the long-term consequences of the security breach.
Points Breakdown –
Original Post (3 pts)
- Two examples of poor security measures (.5 pts) x 2
- Two additional sources for each attack explaining why they were poor security measures (.5 pts) x 2
- Two features you have installed on your computer to protect your security (.5 pts) x 2
Follow-up response (2 pts)
- Prevention and identification (.5 pts) x 2
- AND/OR
- Long-term consequences of the security breach (.5 pts) x 2
Question 2
In the assignment this week you utilized some simple quantitative methods to determine, from the standpoint of a cost benefit analysis, if it was financially prudent to implement identified security controls. There are other methods, in addition to ALE, for quantitatively assessing risk and doing this cost benefit analysis. Research one of these quantitative risk assessment methodologies and provide a 1 – 2 page summary of the method, how it is used, and any pros/cons of its use.
Submission Requirements
- Format: Microsoft Word
- Font: Arial, 12-Point, Double- Space
- Citation Style: APA
- Length: 2–3 pages (minus a cover sheet)