Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

SEC 576 Wk1 DQ1

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
09-04-2023
Written in
2022/2023

Exam of 23 pages for the course DQ1 at DQ1 (SEC 576 Wk1 DQ1)

Institution
Course

Content preview

Risk
Assessment Professor Veletsos 4/30/2016 9:51:20 PM
Colleagues, as you explore and explain each question, such as Risk Analysis, please feel free
to give us examples, real-life situations, or something you read about applicable challenges
(and cite as necessary).




RE: Risk
Assessment Jennifer Wheeler-Davis 5/1/2016 7:25:40 PM
Modified:5/1/2016 7:27 PM
According to this week's lecture, "A risk analysis (RA) is a process by which
threats and vulnerabilities to an organization can be identified." Risk
analyses identify the probability and impact of various events on an
organization or system. In healthcare, I'm most familiar with using
Failure Modes and Effects Analyses (FMEA) to determine the
probability and severity of numbers potential events so actions can be
prioritized. For instance, the impact and probability of giving
medication A to the wrong patient may be much more severe than
giving medication B to the wrong patient so an organization
would prioritize action plans to mitigate the risks of giving
medication A to the wrong patient before medication B.

Reference: Define Risk. Week 1 Lecture. Risk Management. Keller Graduate
School of Management. Retrieved on May 1, 2016.




RE: Risk
5/3/2016 10:28:09 AM
Assessment Ivy Amy Dzimadzor

What is risk Analysis? How is risk analysis different from a vulnerability assessment?

Hello Professor and Class,

"Risk analysis is the process that allows management to demonstrate that it has met its
obligation of due diligence when making a decision about moving forward with a new
project, capital expenditure, investment strategy, or other business processes." Risk
analysis is different from a vulnerability assessment in the sense that performing a
vulnerability assessment is the process of identifying, quantifying, and prioritizing the
vulnerabilities in a company’s system. For example performing a vulnerability scan helps
in detecting if there are any gaps in the system that needs mitigation. I think risk analysis is
the bigger umbrella that management uses or looks at for decision making while a
vulnerability assessment is just the process to identify threats in the organization’s
network/system periodically.

Reference:

, Peltier, Thomas R. Information Security Risk Analysis, Third Edition, 3rd Edition.
Auerbach Publications, 20100316. VitalBook file. Pg.58




RE: Risk
Assessment Grant Cummings 5/7/2016 9:55:18 PM
Thanks for the example. I have also worked with analyzing risk. My experience comes
from the information technology area. As a manager in information technology it is
important to understand where your risks in order abilities are. Documenting your risks and
vulnerabilities is a first step to identifying how to build plans around these items. I have
been able to build the medication plans for various projects that I've been a part of.




RE: Risk
Idrissa Abdul Sangarie 5/4/2016 7:35:20 PM
Assessment
According to our lecture note risk analysis is “a process by which threats and vulnerabilities to an organization can

be defined” analyzing the risk is looking for the vulnerability and the, assessing then and finding the solution to

mitigate the risks. Vulnerability is the weakness and when you identified the weakness then you can have the

opportunity to analyze the weakness and find the ways to make it to your strength or prevent it to become a major

threats if it not already one. Example I am working for www. worlddove.com a new social network site that was

just form, one of the vulnerability of the site from business perspective is engaging the customers , and that was

the vulnerability, when I identify that as a vulnerability then I have the chance to analyze the situation the

weakness the good and the bad if it is not treated seriously, discussion it with the administration and the , they

deem it necessary to make it a huge priority.




RA and
Vulnerability 5/2/2016 3:29:11 PM
Shonita Stevenson
Assessments

What is Risk Analysis? How is risk analysis different from a vulnerability assessment?

Risk Analysis is a process for threats and vulnerabilities to be identified. The process can involve
analysis of those threats to determine probability that the organization may be exposed to such as;
impact, criticality (threats) The risk analysis can also determine through what threats are to be
mitigated and/or determine the threshold of what assets, or physical components at are higher ,
medium

, or low risk.

The Vulnerability Assessment is where the gaps or openings are identified within the organization and
then can be labeled or classified through the means of countermeasures that can be evaluated and then
deployed.

The difference between the two is the risk analysis identifies all potential threats and what the impact
could be … the threat of the potential vulnerability is recognizing the threat and mitigating the risk
prior to it happening or understanding how to remove the threat with use of countermeasures.

a. The qualitative- will ensure to improve awareness of Information systems security
problems and the security posture of the system(s) being analyzed

b. The quantitative – will identify where security controls should be in place or implemented and
the potential cost for the lost.




RE: RA and
Vulnerability 5/2/2016 5:11:17 PM
Mark Reyes
Assessments
IT Risk Analysis Report is used to align technology objectives with its businesses objectives. As
Shonita pointed out a risk analysis report can be either quantitative or qualitative.

With a quantitative risk analysis a attempt is made to numerically determine the probabilities of
various adverse events and the likely extent of the losses if a particular event takes place. This
means it places a numerical percentage that the likelihood an event may happen.

Qualitative risk analysis which is more commonly used does not use numerical probabilities.
Instead it involves defining the various threats, determining the extent of vulnerabilities and
devising countermeasures should an attack occur. This methods specifically defines threats and to
how severe the effects may be if these threats do occur.

http://searchmidmarketsecurity.techtarget.com/definition/risk-analysis




RE: RA and
Vulnerability Jason Chandonnet 5/3/2016 8:37:12 AM
Assessments
That is a good point for both types of risk analysis. Both become important as quantitative
is going to provide a better percentage of possibility that something will happen. If the
percentage can decrease, there will be less events to be concerned about. As for qualitative,
it is needed to point out what events or occurrences will happen. With security, the best
thing is to know how to decrease the risks and what will cause the risks to occur in the first
place. It won't be a total solution but does create prevention methods. The vulnerability
assessment is used to identify, rank and quantify any vulnerability with information on

Written for

Course

Document information

Uploaded on
April 9, 2023
Number of pages
23
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
faithnzuna

Get to know the seller

Seller avatar
faithnzuna Uon
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
3 year
Number of followers
1
Documents
492
Last sold
2 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions