Identifying Threats and Vulnerabilities in an IT Infrastructure
Identifying Threats and Vulnerabilities in an IT Infrastructure
1.Discussion
Provide a description of a project and identify the threat/vulnerability pairs with the associated threat action. You are allowed to make assumptions. For example, the project may be to protect the communications network between the White House and the President’s home in Trump Tower in New York City.
- LAB 1
Identifying Threats and Vulnerabilities in an IT Infrastructure
I have attached the document.
- LAB 2
Aligning Risks, Threats, and Vulnerabilities to COBIT P09 RiskManagement Controls
I have attached the document.
attachment
Risk2E_Lab01_AW.pdf
attachment
Risk2E_Lab02_AW.pdf
The post Identifying Threats and Vulnerabilities in an IT Infrastructure appeared first on superioressaypapers.