Respond to one student post of at least 150 words.
Respond to the following questions:
- What is a Security Risk Assessment?
- What elements does it entail?
- Does it include or exclude Penetration Testing?
- What types of Security Risk Assessments exists? Identify at least 3.
Instructions: Your initial post should be at least 250 words. Please respond to at least 1 other student. Responses should be a minimum of 150 words and include direct questions.
What is a Security Risk Assessment?
When a security risk assessment is accomplished; it implements security assessments for applications. During a security risk assessment prevention is also the focus.
What elements does it entail?
Elements that security risk assessment entails are attack, security breaches and loss. The element of attack is the way to get into the organization to cause damage. Security breaches is when a hacker makes his way into a network system often before anyone knows the hacker was even there. Loss is when there is total damage to the system or vital information has been seized.
Does it include or exclude Penetration Testing?
Penetration Testing is included in the security risk assessment because every method should be tested. Penetration Testing is vital because this is when the deliberate way of cyber attacking a system to find vulnerabilities. jPenetration Testing is sometimes the first choice.
What types of Security Risk Assessments exists? Identify at least 3.
There are a variety number of security risk assessments that exist due different risk cause for different assessments. The three assessments that I will choice is Physical Security, Insider Threat, and Information systems vulnerability.
Physical Security is when security measures are implemented to deny all unauthorized individuals from having access to a network
Insider Threat is someone inside your organization breaches the trust and causes a threat.
Information Systems Vulnerability is having the understanding and safeguarding against security attacks. Vulnerabilities can be fixed and prevention can be installed with firewalls, patches and IT team with trained expertise.