DOC PREVIEW
EIU MIS 4850 - Security Threats Severity Analysis

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Security Threats Severity AnalysisWhat is Severity Analysis?Figure 1-19: Threat Severity AnalysisAccessing potential damageExerciseSecurity Threats Severity AnalysisTuesday 1/15/2008What is Severity Analysis?Accessing security threats occurrence likelihoodAccessing threats’ potential damageAccessing countermeasure costsDetermining the value of protecting against the threats.Figure 1-19: Threat Severity AnalysisStep Threat12345Cost if attack succeedsProbability of occurrenceThreat severityCountermeasure costValue of protectionApply countermeasure?Priority67A$500,00080%$400,000$100,000$300,000Yes1B$10,00020%$2,000 $3,000 ($1,000) NoNAC$100,0005%$5,000 $2,000 $3,000 Yes2D$10,00070%$7,000 $20,000($13,000)NoNAAccessing potential damageDetermining extent to which a threat couldModify critical corporate dataDelete critical corporate dataAllow unauthorized access to confidential info.Allow misdirection of confidential info.Allow message alterationLead to loss of employees or customers’ privacySlow down network servicesJeopardize network service availabilityLead to loss of customers’ faith and trustExerciseVisit the www.sophos.com web site at in order to gather information about a worm called W32/Zafi-B and answer the following two questions.1) Using bullets, list specific malicious actions that W32/Zafi-B could take to potentially damage or disturb a computer system.2) Use the questionnaire provided by the instructor to access the potential risk posed by


View Full Document
Download Security Threats Severity Analysis
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Security Threats Severity Analysis and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Security Threats Severity Analysis 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?