SlideShare a Scribd company logo
The readings this week discusses broad context of risk and
investigative forensics. Part of risk management is to
understand when things go wrong, we need to be able to
investigate and report our findings to management. Using this
research, or other research you have uncovered discuss in detail
how risk and investigate techniques could work to help the
organization. ERM helps to protect an organization before an
attack, where as forensics investigate technique will help us
after an attack - so lets discus both this week.
Reading source:
Chen, J. & Zhu, Q. (2019). Interdependent Strategic Security
Risk Management With Bounded Rationality in the Internet of
Things. IEEE Transactions on Information Forensics and
Security, 14(11), 2958-2971.
Borek, A. (2014). Total Information Risk Management:
Maximizing the Value of Data and Information Assets (Vol.
First edition). Amsterdam: Morgan Kaufmann

More Related Content

Similar to The readings this week discusses broad context of risk and investiga.docx

SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
IJCNCJournal
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summar
manailmalik
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
CSCJournals
 
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
CSCJournals
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
daniahendric
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - edited
Nelson Kimathi
 
Discussion 1Due to increase in the number of cyber-attacks on th
Discussion 1Due to increase in the number of cyber-attacks on thDiscussion 1Due to increase in the number of cyber-attacks on th
Discussion 1Due to increase in the number of cyber-attacks on th
VinaOconner450
 
Discussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on thDiscussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on th
AMMY30
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
greendigital
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )
Monica Rivera
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
Alexander Decker
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
bartholomeocoombs
 
Ict security essay
Ict security essay Ict security essay
Ict security essay
rubtumproject.com
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
stirlingvwriters
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
Matthew Rosenquist
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
felicidaddinwoodie
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
Review Questions What is the difference between a threat agent and a t.pdf
Review Questions What is the difference between a threat agent and a t.pdfReview Questions What is the difference between a threat agent and a t.pdf
Review Questions What is the difference between a threat agent and a t.pdf
vkawtia
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 

Similar to The readings this week discusses broad context of risk and investiga.docx (20)

SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summar
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - edited
 
Discussion 1Due to increase in the number of cyber-attacks on th
Discussion 1Due to increase in the number of cyber-attacks on thDiscussion 1Due to increase in the number of cyber-attacks on th
Discussion 1Due to increase in the number of cyber-attacks on th
 
Discussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on thDiscussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on th
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
Ict security essay
Ict security essay Ict security essay
Ict security essay
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
Review Questions What is the difference between a threat agent and a t.pdf
Review Questions What is the difference between a threat agent and a t.pdfReview Questions What is the difference between a threat agent and a t.pdf
Review Questions What is the difference between a threat agent and a t.pdf
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 

More from helen23456789

The QuestionIs management in the public sector similar to or di.docx
The QuestionIs management in the public sector similar to or di.docxThe QuestionIs management in the public sector similar to or di.docx
The QuestionIs management in the public sector similar to or di.docx
helen23456789
 
The Question To Be AnsweredWhat managers most often want to kn.docx
The Question To Be AnsweredWhat managers most often want to kn.docxThe Question To Be AnsweredWhat managers most often want to kn.docx
The Question To Be AnsweredWhat managers most often want to kn.docx
helen23456789
 
The question What is Life” sounds like the premise of some bad lat.docx
The question What is Life” sounds like the premise of some bad lat.docxThe question What is Life” sounds like the premise of some bad lat.docx
The question What is Life” sounds like the premise of some bad lat.docx
helen23456789
 
the question is notions of visibility are central concepts within T.docx
the question is notions of visibility are central concepts within T.docxthe question is notions of visibility are central concepts within T.docx
the question is notions of visibility are central concepts within T.docx
helen23456789
 
The question is Research Plan and the topic for my research is Impac.docx
The question is Research Plan and the topic for my research is Impac.docxThe question is Research Plan and the topic for my research is Impac.docx
The question is Research Plan and the topic for my research is Impac.docx
helen23456789
 
The question Go to httpwww.heritage.orgindexRanking.aspx (.docx
The question Go to httpwww.heritage.orgindexRanking.aspx (.docxThe question Go to httpwww.heritage.orgindexRanking.aspx (.docx
The question Go to httpwww.heritage.orgindexRanking.aspx (.docx
helen23456789
 
The Question As the global recession evolved into a sovereign.docx
The Question As the global recession evolved into a sovereign.docxThe Question As the global recession evolved into a sovereign.docx
The Question As the global recession evolved into a sovereign.docx
helen23456789
 
The quesion is 

What are the characteristics of transnational tele.docx
The quesion is 

What are the characteristics of transnational tele.docxThe quesion is 

What are the characteristics of transnational tele.docx
The quesion is 

What are the characteristics of transnational tele.docx
helen23456789
 
The Queen of TreesThis video shows the intimate relationship.docx
The Queen of TreesThis video shows the intimate relationship.docxThe Queen of TreesThis video shows the intimate relationship.docx
The Queen of TreesThis video shows the intimate relationship.docx
helen23456789
 
The quesion is What are the characteristics of transnational te.docx
The quesion is What are the characteristics of transnational te.docxThe quesion is What are the characteristics of transnational te.docx
The quesion is What are the characteristics of transnational te.docx
helen23456789
 
The quasi-science of anticipating environmental and competitive ch.docx
The quasi-science of anticipating environmental and competitive ch.docxThe quasi-science of anticipating environmental and competitive ch.docx
The quasi-science of anticipating environmental and competitive ch.docx
helen23456789
 
the quastion Lets Use the Scientific Method !You are Captai.docx
the quastion Lets Use the Scientific Method !You are Captai.docxthe quastion Lets Use the Scientific Method !You are Captai.docx
the quastion Lets Use the Scientific Method !You are Captai.docx
helen23456789
 
The Qualitative Research Studies Adolescent Behaviors & Social .docx
The Qualitative Research Studies Adolescent Behaviors & Social .docxThe Qualitative Research Studies Adolescent Behaviors & Social .docx
The Qualitative Research Studies Adolescent Behaviors & Social .docx
helen23456789
 
The reflective essay took an emotional appeal. I can sense both sy.docx
The reflective essay took an emotional appeal. I can sense both sy.docxThe reflective essay took an emotional appeal. I can sense both sy.docx
The reflective essay took an emotional appeal. I can sense both sy.docx
helen23456789
 
The red coler with file are very importantAttached Files Fixedv.docx
The red coler with file are very importantAttached Files Fixedv.docxThe red coler with file are very importantAttached Files Fixedv.docx
The red coler with file are very importantAttached Files Fixedv.docx
helen23456789
 
The References MUST BE THIS BOOK AND WHATEVER SOURCE YOU WANT TO SI.docx
The References MUST BE THIS BOOK AND WHATEVER SOURCE YOU WANT TO SI.docxThe References MUST BE THIS BOOK AND WHATEVER SOURCE YOU WANT TO SI.docx
The References MUST BE THIS BOOK AND WHATEVER SOURCE YOU WANT TO SI.docx
helen23456789
 
The Reason Why Excelsior College Is My ChoiceEnglish 101Runn.docx
The Reason Why Excelsior College Is My ChoiceEnglish 101Runn.docxThe Reason Why Excelsior College Is My ChoiceEnglish 101Runn.docx
The Reason Why Excelsior College Is My ChoiceEnglish 101Runn.docx
helen23456789
 
The recovery phase of any disaster event creates a huge requirement .docx
The recovery phase of any disaster event creates a huge requirement .docxThe recovery phase of any disaster event creates a huge requirement .docx
The recovery phase of any disaster event creates a huge requirement .docx
helen23456789
 
The reevaluation process in special education is addressed at least .docx
The reevaluation process in special education is addressed at least .docxThe reevaluation process in special education is addressed at least .docx
The reevaluation process in special education is addressed at least .docx
helen23456789
 
The recruitment of employees is a critical part of the HR function a.docx
The recruitment of employees is a critical part of the HR function a.docxThe recruitment of employees is a critical part of the HR function a.docx
The recruitment of employees is a critical part of the HR function a.docx
helen23456789
 

More from helen23456789 (20)

The QuestionIs management in the public sector similar to or di.docx
The QuestionIs management in the public sector similar to or di.docxThe QuestionIs management in the public sector similar to or di.docx
The QuestionIs management in the public sector similar to or di.docx
 
The Question To Be AnsweredWhat managers most often want to kn.docx
The Question To Be AnsweredWhat managers most often want to kn.docxThe Question To Be AnsweredWhat managers most often want to kn.docx
The Question To Be AnsweredWhat managers most often want to kn.docx
 
The question What is Life” sounds like the premise of some bad lat.docx
The question What is Life” sounds like the premise of some bad lat.docxThe question What is Life” sounds like the premise of some bad lat.docx
The question What is Life” sounds like the premise of some bad lat.docx
 
the question is notions of visibility are central concepts within T.docx
the question is notions of visibility are central concepts within T.docxthe question is notions of visibility are central concepts within T.docx
the question is notions of visibility are central concepts within T.docx
 
The question is Research Plan and the topic for my research is Impac.docx
The question is Research Plan and the topic for my research is Impac.docxThe question is Research Plan and the topic for my research is Impac.docx
The question is Research Plan and the topic for my research is Impac.docx
 
The question Go to httpwww.heritage.orgindexRanking.aspx (.docx
The question Go to httpwww.heritage.orgindexRanking.aspx (.docxThe question Go to httpwww.heritage.orgindexRanking.aspx (.docx
The question Go to httpwww.heritage.orgindexRanking.aspx (.docx
 
The Question As the global recession evolved into a sovereign.docx
The Question As the global recession evolved into a sovereign.docxThe Question As the global recession evolved into a sovereign.docx
The Question As the global recession evolved into a sovereign.docx
 
The quesion is 

What are the characteristics of transnational tele.docx
The quesion is 

What are the characteristics of transnational tele.docxThe quesion is 

What are the characteristics of transnational tele.docx
The quesion is 

What are the characteristics of transnational tele.docx
 
The Queen of TreesThis video shows the intimate relationship.docx
The Queen of TreesThis video shows the intimate relationship.docxThe Queen of TreesThis video shows the intimate relationship.docx
The Queen of TreesThis video shows the intimate relationship.docx
 
The quesion is What are the characteristics of transnational te.docx
The quesion is What are the characteristics of transnational te.docxThe quesion is What are the characteristics of transnational te.docx
The quesion is What are the characteristics of transnational te.docx
 
The quasi-science of anticipating environmental and competitive ch.docx
The quasi-science of anticipating environmental and competitive ch.docxThe quasi-science of anticipating environmental and competitive ch.docx
The quasi-science of anticipating environmental and competitive ch.docx
 
the quastion Lets Use the Scientific Method !You are Captai.docx
the quastion Lets Use the Scientific Method !You are Captai.docxthe quastion Lets Use the Scientific Method !You are Captai.docx
the quastion Lets Use the Scientific Method !You are Captai.docx
 
The Qualitative Research Studies Adolescent Behaviors & Social .docx
The Qualitative Research Studies Adolescent Behaviors & Social .docxThe Qualitative Research Studies Adolescent Behaviors & Social .docx
The Qualitative Research Studies Adolescent Behaviors & Social .docx
 
The reflective essay took an emotional appeal. I can sense both sy.docx
The reflective essay took an emotional appeal. I can sense both sy.docxThe reflective essay took an emotional appeal. I can sense both sy.docx
The reflective essay took an emotional appeal. I can sense both sy.docx
 
The red coler with file are very importantAttached Files Fixedv.docx
The red coler with file are very importantAttached Files Fixedv.docxThe red coler with file are very importantAttached Files Fixedv.docx
The red coler with file are very importantAttached Files Fixedv.docx
 
The References MUST BE THIS BOOK AND WHATEVER SOURCE YOU WANT TO SI.docx
The References MUST BE THIS BOOK AND WHATEVER SOURCE YOU WANT TO SI.docxThe References MUST BE THIS BOOK AND WHATEVER SOURCE YOU WANT TO SI.docx
The References MUST BE THIS BOOK AND WHATEVER SOURCE YOU WANT TO SI.docx
 
The Reason Why Excelsior College Is My ChoiceEnglish 101Runn.docx
The Reason Why Excelsior College Is My ChoiceEnglish 101Runn.docxThe Reason Why Excelsior College Is My ChoiceEnglish 101Runn.docx
The Reason Why Excelsior College Is My ChoiceEnglish 101Runn.docx
 
The recovery phase of any disaster event creates a huge requirement .docx
The recovery phase of any disaster event creates a huge requirement .docxThe recovery phase of any disaster event creates a huge requirement .docx
The recovery phase of any disaster event creates a huge requirement .docx
 
The reevaluation process in special education is addressed at least .docx
The reevaluation process in special education is addressed at least .docxThe reevaluation process in special education is addressed at least .docx
The reevaluation process in special education is addressed at least .docx
 
The recruitment of employees is a critical part of the HR function a.docx
The recruitment of employees is a critical part of the HR function a.docxThe recruitment of employees is a critical part of the HR function a.docx
The recruitment of employees is a critical part of the HR function a.docx
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

The readings this week discusses broad context of risk and investiga.docx

  • 1. The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack - so lets discus both this week. Reading source: Chen, J. & Zhu, Q. (2019). Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things. IEEE Transactions on Information Forensics and Security, 14(11), 2958-2971. Borek, A. (2014). Total Information Risk Management: Maximizing the Value of Data and Information Assets (Vol. First edition). Amsterdam: Morgan Kaufmann