In at least 450 words, discuss the following in your main post. i

 

In at least 450 words, discuss the following in your main post.

i should see at least 100 words in each question 

  1. Clearly define threat, vulnerability, and exploit as they relate to information asset. Describe an example of an asset that is different than one already posted in the forum.
  2. Introduce the term cybercrime and why IT professionals should be concerned about it.
  3. Identify the threats/vulnerabilities presented in the video, Cybercrime: The Invisible Threat, from Films on Demand, and discuss whether the threats are controllable.
  4. What part of risk management addresses the threats such as those in the video? Can they be quantified? Should SETA come into play?

NOTE: Sites the professor mentioned about

  • NIST SP 800-30 Rev. 1
  • NIST SP 800-39

"Get Help With Your Essay
. If you need assistance with writing your essay, our professional essay writing service is here to help!

Order Now