Lht2 Cyberlaw Regs & Compliance Task 4

3495 Words14 Pages
LHT2 CyberLaw Regs & Compliance Task 4 | RISK ANALYSIS AND CYBERCRIME PREVENTION | [Document subtitle] | | 1. Below is a definition of terms as they relate to the following risk analysis: A. Threat * “Any circumstance or event with the potential to adversely impact organizational operations and assets...” (Ross, 2012). In other words, anything that can exploit a vulnerability thereby causing damage to an asset belonging to Military Contractors Inc. Some examples of a threat could be an attacker looking to get into the network to steal classified data, or a protester group looking to make a cause statement. B. Hazard * A hazard is a circumstance that has the possibility of causing damage. This word is used to reference events that are non-manmade such as natural disasters, fire, power outage, etc. A hazard in and of itself, can be considered a threat if damage to assets is allowed through a vulnerability. C. Vulnerability * Vulnerabilities are any type weakness of any kind that can be caused or exploited by a threat (Ross, 2012). An example of vulnerability could be, allowing unrestricted access to the servers and/or networking equipment. D. Risk * “A measure of the extent to which an entity is threatened by a potential circumstance or event…” (Ross, 2012). By using a matrix of the amount of damage caused should an event occur cross referenced with the likelihood of that event actually taking place, risk can be calculated. E. Asset * Any property owned by ABC Military Contractors Inc. Assets can be physical or intellectual property. Examples of an asset could be computers, network components, portable radar systems components, classified blueprints, physical buildings, and so on. 2. Contractors under federal contract are mandated to be in compliance with
Open Document