network communication

network communication

Application of Risk Management Techniques
1. Identify, analyze, and explain several likely threat/vulnerability pairs and their likelihood of occurrence in this scenario.
A. Vulnerability: No backup servers
Threat: They go down and there are no backups
B. They only 1 ISP- Threat
If the ISP goes down they lose all connections- Vulnerability
C. Home office- Vulnerability
Disgruntled employees- threat
Compromised ISP- Threat
2. Determine which of the six risk management techniques is appropriate for each risk explained in Task 1.
A. Mitigation/cost benefit analysis
B. Cost benefit analysis
C. Cost benefit
3. Justify your reasoning for each chosen management technique.
A. This is both because with cost benefit, you are saving money by having only 1 server location and no backups, and this is also mitigation because trying to reduce risks.
B. This is cost because they are trying to save money by only having 1 ISP.
C. This is because they are trying to save money by having people work from home.


4. Prepare a brief report or presentation of your findings for senior management to review.
There are many changes that should be taken into consideration; first you will want to have a backup location. This is because if something was to happen to the one location you will lose everything. You will want to have more than one ISP; this is also because if the one ISP goes down you no longer have any connectivity. As for having people work from home you are increasing you chances of having disgruntled employees steal/ corrupt the data. You have the same possibility as if they worked in the office but the chances are not as high because you can make it so they are not able to use USB and cut the chances of having the data corrupted.

Similar Essays