In at least 450 words, discuss the following in your main post. i
In at least 450 words, discuss the following in your main post.
i should see at least 100 words in each question
- Clearly define threat, vulnerability, and exploit as they relate to information asset. Describe an example of an asset that is different than one already posted in the forum.
- Introduce the term cybercrime and why IT professionals should be concerned about it.
- Identify the threats/vulnerabilities presented in the video, Cybercrime: The Invisible Threat, from Films on Demand, and discuss whether the threats are controllable.
- What part of risk management addresses the threats such as those in the video? Can they be quantified? Should SETA come into play?
NOTE: Sites the professor mentioned about
- NIST SP 800-30 Rev. 1
- NIST SP 800-39