Security Risks

There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks. Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat. In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:

•Confidentiality

•Integrity

•Availability

•Some or all of the three (Confidentiality, Integrity, and/or Availability) Include suggestions on how to counter each threat listed. Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document. Submit your assignment using the Assignment Files tab.vicky be my main main.love

Question 2

  1. Locate an article pertaining to recent cyber security incident impacting electronic commerce at a specific firm published within the last three months.
  2. Include a link to the article.
  3. Write a summary of the incident.
  4. Who was impacted?
  5. What technical vulnerability (if any) made this attack possible?
  6. How did human error play a role?
  7. What was the financial impact of this incident?
  8. What could have been done to prevent this incident?
  9. How was electronic commerce impacted?
  10. Run their website through the SSL Server Test (Powered by Qualys SSL Labs) – what were the results? Name one way they could improve their score.
  11. 2 – 3 pages.

Do you need help with this assignment or any other? We got you! Place your order and leave the rest to our experts.

Quality Guaranteed

Any Deadline

No Plagiarism