Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Unit 1 Assignment Documentation, Policies, and Risk Management Part 1 In a short essay, briefly explain the formula SLE x ARO = ALE

Unit 1 Assignment Documentation, Policies, and Risk Management Part 1 In a short essay, briefly explain the formula SLE x ARO = ALE

Computer Science

Unit 1 Assignment Documentation, Policies, and Risk Management

Part 1

  1. In a short essay, briefly explain the formula SLE x ARO = ALE. Give an example.
  2. Once a risk assessment has been completed, briefly explain the five actions you can use to reduce the risk. In addition, describe how staying on task, meeting deadlines, and utilizing feedback can each have a positive impact on reducing risk and promoting positive results in a group setting.
  3. Risks associated with state-of-the-art technologies should be carefully assessed. In a short essay examine the risks associated with cloud computing and virtualization and provide two recommendations to your management.
  4. Review the following security policy. In a short table match the five key areas of a good policy with the example below. Where does it match? Where can it be improved?

Website Security Policy

This site collects personal information from you when you register, including a record of your email address. We also may collect IP addresses and domain names of users of this site to measure the number of visits, time spent on the site, etc. We may occasionally ask you to complete surveys for research purposes.

"Cookies" may be used in connection with this website. A cookie is a small amount data sent to your browser stored on your computer's hard drive. Using cookies enables us to collect data without your express knowledge or approval. Most browsers are initially set to accept cookies but you can change the setting to refuse to allow cookies.

We may provide the information we collect through this site to business partners. We may also use the information to inform you of new products, services, or promotions. We will not share personal information you submit to third parties unless ordered to do so by a legal authority.

Any questions regarding this policy should be directed to:

  1. In a short essay, define high availability, redundancy, and fault tolerance. How are they similar? How do differ?
  2. The Reading outlines a number of business policies including separation of duties and job rotation. Define two of these and explain why you would or would not implement them if you were a CIO (Chief Information Officer). As a CIO, describe how you will promote reliability, accountability, and timeliness in a group work setting. Use specific examples to support your claims.

Part 2

The National Institute of Science and Technology (NIST) offers free reports for best practices. Download the Guide fo r Conducting Risk Assessments, which is available at:

http://csrc.nist.gov/publications/nistpubs/800-30rev1/sp800_30_r1.pdf

Source: National Institute of Standards and Technology.

Retrieved from http://csrc.nist.gov/

  1. Take a screen capture of Figure 5: The Risk Assessment Process.
  2. Review the words “threat” and “vulnerability” in the glossary for this publication. Explain the difference between the two.
  3. Review each Appendix. Select one threat and follow Step

2: Conduct Assessment (Ex: Identify Threat Sources and Events, Identify Vulnerabilities and Predisposing Conditions, etc.) from the Risk Assessment Process. Create a brief table showing your assessment with estimated Qualitative Values and Semi-Quantitative Values.

Review the rubric before beginning this activity.

Option 1

Low Cost Option
Download this past answer in few clicks

22.99 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE