Project 1: Vulnerability and Threat Assessment Start Here Print Project Vulnerab

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Project 1: Vulnerability and Threat Assessment
Start Here
Print Project
Vulnerabilities are security holes or flaws that can leave a system open to attack. These may be from an inherent weakness in the system itself, in procedures used, external sources, or anything that may leave information exposed.
A threat is an event that has the potential to damage an organization or any part of it. Threats can be human or nonhuman.
It is important that organizations actively assess their vulnerabilities and threats as well as ways to address them. In this project, you will perform a vulnerability assessment, which identifies, classifies, and ranks the vulnerabilities for your organization from a disaster-management perspective.
The assessment will be completed in a series of steps. You will classify and prioritize threats, assess vulnerabilities, and include a “lessons learned” section as part of the assessment.
Your final document will be seven plus pages long, not including charts and graphics, and will include appendices, including a vulnerability assessment matrix. Throughout the process, you will be submitting portions of the document to your instructor for feedback so you can adjust materials before submitting the final assessment.
You will be assessed on the coherence, inclusiveness, and feasibility of your findings and recommendations on the vulnerabilities of an organization from a disaster-management perspective.
This is the first of four sequential projects in this course. There are 12 steps in this project. Now that you have an idea of the task ahead, review the scenario next to get started.
Transcript
Competencies
Your work will be evaluated using the competencies listed below.
1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
1.5: Use sentence structure appropriate to the task, message and audience.
9.2: Vulnerability Assessment: Rank the vulnerabilities of a system from a disaster-management perspective.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now