+1(978)310-4246 credencewriters@gmail.com
  

DISCUSSION 2
Please respond to the following in a post of 150–200 words:

Compare/contrast qualitative and quantitative assessments.
Based on your experience, provide examples of each.
Determine which approach is best to assess IT risk.  Be sure to include your rationale.

DISCUSSION 3
Threat modeling is the process used to identify security requirements by reviewing a diagram of the information technology architecture. The threat surface is the sum total of all the ways a threat can cross the boundary.
In this discussion post, you will use threat modeling to secure your residence.
Please respond to the following in a post of 150–200 words:
Address each of these threat modeling steps to secure your residential system:

Step 1: Identify security objectives.
Step 2: Identify assets and external dependencies.
Step 3: Identify trust zones. 
Step 4: Identify potential threats and vulnerabilities.
Step 5: Document your threat model. 

Note: 

In your post, be sure to explain how physical, logical, and administrative aspects of threats may interact.

  
error: Content is protected !!