Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
Question
Book Icon
Chapter 6, Problem 1E
Program Plan Intro

Vulnerability:

  • Vulnerability refers to the exact methods that the threat agents can exploit for attacking an information asset.
  • It is also defined as a certain fault or a weakness found in an information asset, the security process, the design or even the management which can be exploited inadvertently.

Explanation of Solution

Last evaluated vulnerability:

In this case, the third vulnerability will be evaluated last.

Reason:

  • It...

Blurred answer
Students have asked these similar questions
Exercise 1:  If an organization has three information assets to evaluate for risk management purposes, as shown in the list below, which vulnerability should be evaluated for additional controls first? Which vulnerability should be evaluated last? A CRM-Server that is connected to the Internet. It has two vulnerabilities: (i) susceptibility to hardware failure, with a likelihood of 8, and (ii) susceptibility to ransomware attack with a likelihood of 4. The CRM-Server has been assigned an impact value of 10.  Assume that there are no current controls in place to protect it, and there is a 75 percent certainty of the assumptions and data An E-commerce server hosts the company Web site and supports customer transactions. It runs a server software that is vulnerable to a buffer overflow attack, with the likelihood of such an attack estimated at 6. The server has been assigned an impact value of 8. Assume that there are no current controls in place to protect the server, and there is…
If an organization must evaluate the following three information assets for risk management, which vulnerability should be evaluated first for additional controls? Which should be evaluated last? Switch L4 7 connects a network to the Internet. It has two vulnerabilities: it is susceptible to a hardware failure at a likelihood of 0.2, and it is subject to an SNMP buffer overflow attack at a likelihood of 0.1. This switch has an impact rating of 90 and has no current controls in place. You are 75 percent certain of the assumptions and data. Server WebSrv6 hosts a company Web site and performs e-commerce transactions. It has a Web server version that can be attacked by sending it invalid Unicode values. The likelihood of that attack is estimated at 0.1. The server has been assigned an impact value of 100, and control has been implanted that reduces the impact of the vulnerability by 75 percent. You are 80 percent certain of the assumptions and data. Operators use an MGMT45 control…
Using each term as a computer network vulnerabilities category, explain an example of a vulnerability for each category in the context of Information Security. 1. Hardware 2. Software 3. Operator 4. Maintanance man 5. Access 6. Systems programmer 7. User 8. Files 9. Hardware
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning