SlideShare a Scribd company logo
1.
Asset
identification:
Identify what might be a personal or business asset (think of
something you have at home that you would like to protect, or
something that your company has that needs protection).
2.
Attacker/threat identification:
Who are the likely attackers to that asset? What other threats
are there that can negatively impact that asset? Remember that
an attacker is always a person with intent, and is only one type
of threat - we also have natural disasters, accidents, etc. that are
not "attacks" as they don't have malicious intent behind them.
3.
Impact:
Identify the impact if the attack or threat was "actualized"
(happened). Would there be a monetary loss? Loss of
confidence (in the event of a business breach)? Fine (in the
event of a loss of PII or PHI)?
4.
Remediation:
Research and recommend a security control (i.e. firewall, lock
on a door, etc.) that can remediate (prevent, detect, correct,
etc.) the attack or threat.

More Related Content

Similar to 1.  Assetidentification  Identify what might be a personal .docx

Law Enforcement Administration II
Law Enforcement Administration IILaw Enforcement Administration II
Law Enforcement Administration II
Vanrex Pasco
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
Roger Johnston
 
Bomb_Threat_Management (MODIFIED) powerpoint
Bomb_Threat_Management (MODIFIED) powerpointBomb_Threat_Management (MODIFIED) powerpoint
Bomb_Threat_Management (MODIFIED) powerpoint
GilbertFernando5
 
Personal protection
Personal protectionPersonal protection
Personal protectionRCIPS
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 

Similar to 1.  Assetidentification  Identify what might be a personal .docx (6)

Law Enforcement Administration II
Law Enforcement Administration IILaw Enforcement Administration II
Law Enforcement Administration II
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
 
Bomb_Threat_Management (MODIFIED) powerpoint
Bomb_Threat_Management (MODIFIED) powerpointBomb_Threat_Management (MODIFIED) powerpoint
Bomb_Threat_Management (MODIFIED) powerpoint
 
Personal protection
Personal protectionPersonal protection
Personal protection
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 

More from tangyechloe

BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docxBIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
tangyechloe
 
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docxBIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
tangyechloe
 
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docxBIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
tangyechloe
 
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docxBIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
tangyechloe
 
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docxBio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
tangyechloe
 
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docxBio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
tangyechloe
 
Bill is a young professional who comes to you for help. He earns a v.docx
Bill is a young professional who comes to you for help. He earns a v.docxBill is a young professional who comes to you for help. He earns a v.docx
Bill is a young professional who comes to you for help. He earns a v.docx
tangyechloe
 
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docxBio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
tangyechloe
 
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docxBIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
tangyechloe
 
Bio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docxBio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docx
tangyechloe
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
tangyechloe
 
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docxBIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
tangyechloe
 
billy rich and Michael million are two very wealthy, elderly men. si.docx
billy rich and Michael million are two very wealthy, elderly men. si.docxbilly rich and Michael million are two very wealthy, elderly men. si.docx
billy rich and Michael million are two very wealthy, elderly men. si.docx
tangyechloe
 
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
Billau !  1Alessandro Billau Dr. Daniel Cicenia  C.docxBillau !  1Alessandro Billau Dr. Daniel Cicenia  C.docx
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
tangyechloe
 
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docxBIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
tangyechloe
 
Big Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docxBig Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docx
tangyechloe
 
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docxBIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
tangyechloe
 
Big Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docxBig Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docx
tangyechloe
 
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docxbibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
tangyechloe
 
Big data in media and digital  PlatformsResearch Paper Format.docx
Big data in media and digital  PlatformsResearch Paper Format.docxBig data in media and digital  PlatformsResearch Paper Format.docx
Big data in media and digital  PlatformsResearch Paper Format.docx
tangyechloe
 

More from tangyechloe (20)

BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docxBIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
 
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docxBIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
 
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docxBIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
 
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docxBIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
 
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docxBio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
 
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docxBio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
 
Bill is a young professional who comes to you for help. He earns a v.docx
Bill is a young professional who comes to you for help. He earns a v.docxBill is a young professional who comes to you for help. He earns a v.docx
Bill is a young professional who comes to you for help. He earns a v.docx
 
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docxBio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
 
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docxBIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
 
Bio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docxBio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docx
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
 
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docxBIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
 
billy rich and Michael million are two very wealthy, elderly men. si.docx
billy rich and Michael million are two very wealthy, elderly men. si.docxbilly rich and Michael million are two very wealthy, elderly men. si.docx
billy rich and Michael million are two very wealthy, elderly men. si.docx
 
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
Billau !  1Alessandro Billau Dr. Daniel Cicenia  C.docxBillau !  1Alessandro Billau Dr. Daniel Cicenia  C.docx
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
 
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docxBIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
 
Big Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docxBig Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docx
 
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docxBIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
 
Big Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docxBig Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docx
 
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docxbibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
 
Big data in media and digital  PlatformsResearch Paper Format.docx
Big data in media and digital  PlatformsResearch Paper Format.docxBig data in media and digital  PlatformsResearch Paper Format.docx
Big data in media and digital  PlatformsResearch Paper Format.docx
 

Recently uploaded

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

1.  Assetidentification  Identify what might be a personal .docx

  • 1. 1. Asset identification: Identify what might be a personal or business asset (think of something you have at home that you would like to protect, or something that your company has that needs protection). 2. Attacker/threat identification: Who are the likely attackers to that asset? What other threats are there that can negatively impact that asset? Remember that an attacker is always a person with intent, and is only one type of threat - we also have natural disasters, accidents, etc. that are not "attacks" as they don't have malicious intent behind them. 3. Impact: Identify the impact if the attack or threat was "actualized" (happened). Would there be a monetary loss? Loss of confidence (in the event of a business breach)? Fine (in the event of a loss of PII or PHI)? 4. Remediation: Research and recommend a security control (i.e. firewall, lock on a door, etc.) that can remediate (prevent, detect, correct, etc.) the attack or threat.