How does each attack surface – its protections if any, in the presence (or absence) of active threat agents and their capabilities
Please review chapter#4 from the textbook attached
Faced with the need to deliver risk ratings for your organization, you will have to substitute the organization’s risk preferences for your own. For, indeed, it is the organization’s risk tolerance that the assessment is trying to achieve, not each assessor’s personal risk preferences.
- What is the risk posture for each particular system as it contributes to the overall risk posture of the organization?
- How does each attack surface – its protections if any, in the presence (or absence) of active threat agents and their capabilities, methods, and goals through each situation—add up to a system’s particular risk posture?
- In addition, how do all the systems’ risks sum up to an organization’s computer security risk posture?
Answer the questions with an APA-formatted paper (Title page, body and references only). Your response should have a minimum of 600 words. Count the words only in the body of your response, not the references. A table of contents and abstract are not required.A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed. There should be multiple citations within the body of the paper. Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.