SlideShare a Scribd company logo
1 of 2
Section 5: Controlling Risk
This final section combines all of the previous sections and
gives the opportunity to look at mechanisms to control risk.
Be sure to include an abstract and a References page in your
final draft.
The project deliverables for Week 5 are as follows:
Section 5: Controlling Risk
Given the following categories or areas where risk exists, and
then the 3 assets for each, describe how you will test for
associated risk:
Administrative
Human resources:
Hiring and termination practices
Organizational structure:
A formal security program
Security policies:
Accurate, updated, and known or used
Technical
Access control:
Least privileged
System architecture:
Separated network segments
System configurations:
Default configurations
Physical
Heating and air conditioning:
Proper cooling and humidity
Fire:
Fire suppression
Flood:
Data center location
Once you have described the tests that will be conducted to test
each, assume that failure or holes were found in each of them.
Next, describe at least 3 safeguards for each that could be put in
place to address the risk.
Name the document "yourname_IT454_Final.doc."

More Related Content

Similar to Section 5 Controlling RiskThis final section combines all of the .docx

CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comKeatonJennings104
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comagathachristie113
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docxodiliagilby
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comBaileyabw
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.comDavisMurphyA97
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comdonaldzs8
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comrobertlesew6
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comMcdonaldRyan79
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comPrescottLunt385
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comDavis11a
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016Ashley Deuble
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxronak56
 
Assignment ContentYou are part of a team selected by the C.docx
Assignment ContentYou are part of a team selected by the C.docxAssignment ContentYou are part of a team selected by the C.docx
Assignment ContentYou are part of a team selected by the C.docxlesleyryder69361
 
Assignment ContentYou are part of a team selected by the Chi.docx
Assignment ContentYou are part of a team selected by the Chi.docxAssignment ContentYou are part of a team selected by the Chi.docx
Assignment ContentYou are part of a team selected by the Chi.docxlesleyryder69361
 
Write 5 pages in which you identify network operating system mitigat.docx
Write 5 pages in which you identify network operating system mitigat.docxWrite 5 pages in which you identify network operating system mitigat.docx
Write 5 pages in which you identify network operating system mitigat.docxsleeperfindley
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.comHarrisGeorg12
 
Section 5 Controlling Risk Given the following categories or areas .pdf
Section 5 Controlling Risk Given the following categories or areas .pdfSection 5 Controlling Risk Given the following categories or areas .pdf
Section 5 Controlling Risk Given the following categories or areas .pdfarihantcomp1008
 
First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]Phil Huggins FBCS CITP
 

Similar to Section 5 Controlling RiskThis final section combines all of the .docx (20)

CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.com
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
 
Cmgt 430 cmgt430
Cmgt 430 cmgt430Cmgt 430 cmgt430
Cmgt 430 cmgt430
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.com
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.com
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.com
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docx
 
Assignment ContentYou are part of a team selected by the C.docx
Assignment ContentYou are part of a team selected by the C.docxAssignment ContentYou are part of a team selected by the C.docx
Assignment ContentYou are part of a team selected by the C.docx
 
Assignment ContentYou are part of a team selected by the Chi.docx
Assignment ContentYou are part of a team selected by the Chi.docxAssignment ContentYou are part of a team selected by the Chi.docx
Assignment ContentYou are part of a team selected by the Chi.docx
 
Write 5 pages in which you identify network operating system mitigat.docx
Write 5 pages in which you identify network operating system mitigat.docxWrite 5 pages in which you identify network operating system mitigat.docx
Write 5 pages in which you identify network operating system mitigat.docx
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
Section 5 Controlling Risk Given the following categories or areas .pdf
Section 5 Controlling Risk Given the following categories or areas .pdfSection 5 Controlling Risk Given the following categories or areas .pdf
Section 5 Controlling Risk Given the following categories or areas .pdf
 
First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]
 

More from kaylee7wsfdubill

Seeking a complete Excel spreadsheet with cell equations, and answer.docx
Seeking a complete Excel spreadsheet with cell equations, and answer.docxSeeking a complete Excel spreadsheet with cell equations, and answer.docx
Seeking a complete Excel spreadsheet with cell equations, and answer.docxkaylee7wsfdubill
 
see the attachmentA. Describe each of the three components in th.docx
see the attachmentA. Describe each of the three components in th.docxsee the attachmentA. Describe each of the three components in th.docx
see the attachmentA. Describe each of the three components in th.docxkaylee7wsfdubill
 
See the questions belowA. As you choose a culture or cultu.docx
See the questions belowA. As you choose a culture or cultu.docxSee the questions belowA. As you choose a culture or cultu.docx
See the questions belowA. As you choose a culture or cultu.docxkaylee7wsfdubill
 
Security of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxSecurity of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxkaylee7wsfdubill
 
see attachment1. A key objective of change control in configura.docx
see attachment1. A key objective of change control in configura.docxsee attachment1. A key objective of change control in configura.docx
see attachment1. A key objective of change control in configura.docxkaylee7wsfdubill
 
See attached document for additional guidance How are your two phi.docx
See attached document for additional guidance How are your two phi.docxSee attached document for additional guidance How are your two phi.docx
See attached document for additional guidance How are your two phi.docxkaylee7wsfdubill
 
Security SolutionThe weekly assignment for the course is a compreh.docx
Security SolutionThe weekly assignment for the course is a compreh.docxSecurity SolutionThe weekly assignment for the course is a compreh.docx
Security SolutionThe weekly assignment for the course is a compreh.docxkaylee7wsfdubill
 
Security PaperResearch one of the following topicsA couple of t.docx
Security PaperResearch one of the following topicsA couple of t.docxSecurity PaperResearch one of the following topicsA couple of t.docx
Security PaperResearch one of the following topicsA couple of t.docxkaylee7wsfdubill
 
Security and Privacy in the 21st CenturyRead the following article.docx
Security and Privacy in the 21st CenturyRead the following article.docxSecurity and Privacy in the 21st CenturyRead the following article.docx
Security and Privacy in the 21st CenturyRead the following article.docxkaylee7wsfdubill
 
See attached file. Your work should be submitted in a Word docume.docx
See attached file. Your work should be submitted in a Word docume.docxSee attached file. Your work should be submitted in a Word docume.docx
See attached file. Your work should be submitted in a Word docume.docxkaylee7wsfdubill
 
See discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docxSee discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docxkaylee7wsfdubill
 
See attached file or belowSuppose that there are two (.docx
See attached file or belowSuppose that there are two (.docxSee attached file or belowSuppose that there are two (.docx
See attached file or belowSuppose that there are two (.docxkaylee7wsfdubill
 
Security Support Responsibilities Please respond to the following.docx
Security Support Responsibilities Please respond to the following.docxSecurity Support Responsibilities Please respond to the following.docx
Security Support Responsibilities Please respond to the following.docxkaylee7wsfdubill
 
see attached fact sheetObviously, Michelle is upset and would l.docx
see attached fact sheetObviously, Michelle is upset and would l.docxsee attached fact sheetObviously, Michelle is upset and would l.docx
see attached fact sheetObviously, Michelle is upset and would l.docxkaylee7wsfdubill
 
Security Monitoring  Please respond to the followingConsidering.docx
Security Monitoring  Please respond to the followingConsidering.docxSecurity Monitoring  Please respond to the followingConsidering.docx
Security Monitoring  Please respond to the followingConsidering.docxkaylee7wsfdubill
 
Section 1–Organizational DescriptionAssignment Length 2–3 pages.docx
Section 1–Organizational DescriptionAssignment Length 2–3 pages.docxSection 1–Organizational DescriptionAssignment Length 2–3 pages.docx
Section 1–Organizational DescriptionAssignment Length 2–3 pages.docxkaylee7wsfdubill
 
Section 1 MS Project Exercise1. Develop a multilevel work breakdo.docx
Section 1 MS Project Exercise1. Develop a multilevel work breakdo.docxSection 1 MS Project Exercise1. Develop a multilevel work breakdo.docx
Section 1 MS Project Exercise1. Develop a multilevel work breakdo.docxkaylee7wsfdubill
 
Second Wave Feminism, gained strength during the 1970s. For this .docx
Second Wave Feminism, gained strength during the 1970s. For this .docxSecond Wave Feminism, gained strength during the 1970s. For this .docx
Second Wave Feminism, gained strength during the 1970s. For this .docxkaylee7wsfdubill
 
Search the Internet for pertinent information that supports the inte.docx
Search the Internet for pertinent information that supports the inte.docxSearch the Internet for pertinent information that supports the inte.docx
Search the Internet for pertinent information that supports the inte.docxkaylee7wsfdubill
 
Section 404 of the Sarbanes-Oxley Act of 2002 (SOX) directs the SE.docx
Section 404 of the Sarbanes-Oxley Act of 2002 (SOX) directs the SE.docxSection 404 of the Sarbanes-Oxley Act of 2002 (SOX) directs the SE.docx
Section 404 of the Sarbanes-Oxley Act of 2002 (SOX) directs the SE.docxkaylee7wsfdubill
 

More from kaylee7wsfdubill (20)

Seeking a complete Excel spreadsheet with cell equations, and answer.docx
Seeking a complete Excel spreadsheet with cell equations, and answer.docxSeeking a complete Excel spreadsheet with cell equations, and answer.docx
Seeking a complete Excel spreadsheet with cell equations, and answer.docx
 
see the attachmentA. Describe each of the three components in th.docx
see the attachmentA. Describe each of the three components in th.docxsee the attachmentA. Describe each of the three components in th.docx
see the attachmentA. Describe each of the three components in th.docx
 
See the questions belowA. As you choose a culture or cultu.docx
See the questions belowA. As you choose a culture or cultu.docxSee the questions belowA. As you choose a culture or cultu.docx
See the questions belowA. As you choose a culture or cultu.docx
 
Security of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxSecurity of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docx
 
see attachment1. A key objective of change control in configura.docx
see attachment1. A key objective of change control in configura.docxsee attachment1. A key objective of change control in configura.docx
see attachment1. A key objective of change control in configura.docx
 
See attached document for additional guidance How are your two phi.docx
See attached document for additional guidance How are your two phi.docxSee attached document for additional guidance How are your two phi.docx
See attached document for additional guidance How are your two phi.docx
 
Security SolutionThe weekly assignment for the course is a compreh.docx
Security SolutionThe weekly assignment for the course is a compreh.docxSecurity SolutionThe weekly assignment for the course is a compreh.docx
Security SolutionThe weekly assignment for the course is a compreh.docx
 
Security PaperResearch one of the following topicsA couple of t.docx
Security PaperResearch one of the following topicsA couple of t.docxSecurity PaperResearch one of the following topicsA couple of t.docx
Security PaperResearch one of the following topicsA couple of t.docx
 
Security and Privacy in the 21st CenturyRead the following article.docx
Security and Privacy in the 21st CenturyRead the following article.docxSecurity and Privacy in the 21st CenturyRead the following article.docx
Security and Privacy in the 21st CenturyRead the following article.docx
 
See attached file. Your work should be submitted in a Word docume.docx
See attached file. Your work should be submitted in a Word docume.docxSee attached file. Your work should be submitted in a Word docume.docx
See attached file. Your work should be submitted in a Word docume.docx
 
See discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docxSee discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docx
 
See attached file or belowSuppose that there are two (.docx
See attached file or belowSuppose that there are two (.docxSee attached file or belowSuppose that there are two (.docx
See attached file or belowSuppose that there are two (.docx
 
Security Support Responsibilities Please respond to the following.docx
Security Support Responsibilities Please respond to the following.docxSecurity Support Responsibilities Please respond to the following.docx
Security Support Responsibilities Please respond to the following.docx
 
see attached fact sheetObviously, Michelle is upset and would l.docx
see attached fact sheetObviously, Michelle is upset and would l.docxsee attached fact sheetObviously, Michelle is upset and would l.docx
see attached fact sheetObviously, Michelle is upset and would l.docx
 
Security Monitoring  Please respond to the followingConsidering.docx
Security Monitoring  Please respond to the followingConsidering.docxSecurity Monitoring  Please respond to the followingConsidering.docx
Security Monitoring  Please respond to the followingConsidering.docx
 
Section 1–Organizational DescriptionAssignment Length 2–3 pages.docx
Section 1–Organizational DescriptionAssignment Length 2–3 pages.docxSection 1–Organizational DescriptionAssignment Length 2–3 pages.docx
Section 1–Organizational DescriptionAssignment Length 2–3 pages.docx
 
Section 1 MS Project Exercise1. Develop a multilevel work breakdo.docx
Section 1 MS Project Exercise1. Develop a multilevel work breakdo.docxSection 1 MS Project Exercise1. Develop a multilevel work breakdo.docx
Section 1 MS Project Exercise1. Develop a multilevel work breakdo.docx
 
Second Wave Feminism, gained strength during the 1970s. For this .docx
Second Wave Feminism, gained strength during the 1970s. For this .docxSecond Wave Feminism, gained strength during the 1970s. For this .docx
Second Wave Feminism, gained strength during the 1970s. For this .docx
 
Search the Internet for pertinent information that supports the inte.docx
Search the Internet for pertinent information that supports the inte.docxSearch the Internet for pertinent information that supports the inte.docx
Search the Internet for pertinent information that supports the inte.docx
 
Section 404 of the Sarbanes-Oxley Act of 2002 (SOX) directs the SE.docx
Section 404 of the Sarbanes-Oxley Act of 2002 (SOX) directs the SE.docxSection 404 of the Sarbanes-Oxley Act of 2002 (SOX) directs the SE.docx
Section 404 of the Sarbanes-Oxley Act of 2002 (SOX) directs the SE.docx
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Section 5 Controlling RiskThis final section combines all of the .docx

  • 1. Section 5: Controlling Risk This final section combines all of the previous sections and gives the opportunity to look at mechanisms to control risk. Be sure to include an abstract and a References page in your final draft. The project deliverables for Week 5 are as follows: Section 5: Controlling Risk Given the following categories or areas where risk exists, and then the 3 assets for each, describe how you will test for associated risk: Administrative Human resources: Hiring and termination practices Organizational structure: A formal security program Security policies: Accurate, updated, and known or used Technical Access control: Least privileged System architecture: Separated network segments System configurations: Default configurations Physical Heating and air conditioning: Proper cooling and humidity Fire: Fire suppression Flood: Data center location Once you have described the tests that will be conducted to test each, assume that failure or holes were found in each of them. Next, describe at least 3 safeguards for each that could be put in
  • 2. place to address the risk. Name the document "yourname_IT454_Final.doc."