answer-the-below-questions-based-on-the-security-architecture-and-design

Topic 1:

What are people currently doing to achieve security objectives? Where do those security objectives originate? Who are the people who are engaged in security and what are their reasons for engagement?

Minimum of 300 words

APA Format

Plagiarism free.

Topic 2:

Instructions:For each item below, write a reply to support the asset. Use the APA cover sheet and include the date.Please THINK!!! Please write 1 to 3 sentences.

Attached a document too for this.

Part A.

Asset (1)

Computer Servers

Threat

{delete and type your answer}

Vulnerability

{delete and type your answer}

Risk

{delete and type your answer}

Asset (2)

Trade secrets for a company

Threat

{delete and type your answer}

Vulnerability

{delete and type your answer}

Risk

{delete and type your answer}

Asset (3)

Data stored in the cloud

Threat

{delete and type your answer}

Vulnerability

{delete and type your answer}

Risk

{delete and type your answer}

Asset (4)

Critical mission software

Threat

{delete and type your answer}

Vulnerability

{delete and type your answer}

Risk

{delete and type your answer}

Asset (5)

Employees

Threat

{delete and type your answer}

Vulnerability

{delete and type your answer}

Risk

{delete and type your answer}

Asset (6)

Hardware Firewalls

Threat

{delete and type your answer}

Vulnerability

{delete and type your answer}

Risk

{delete and type your answer}

 

"PLACE THIS ORDER OR A SIMILAR ORDER WITH BLACKBOARD MASTERS AND GET AN AMAZING DISCOUNT"