answer the below questions based on the security architecture and design
Topic 1:
What are people currently doing to achieve security objectives? Where do those security objectives originate? Who are the people who are engaged in security and what are their reasons for engagement?
Minimum of 300 words
APA Format
Plagiarism free.
Topic 2:
Instructions:For each item below, write a reply to support the asset. Use the APA cover sheet and include the date.Please THINK!!! Please write 1 to 3 sentences.
Attached a document too for this.
Part A.
Asset (1) |
Computer Servers |
Threat |
{delete and type your answer} |
Vulnerability |
{delete and type your answer} |
Risk |
{delete and type your answer} |
Asset (2) |
Trade secrets for a company |
Threat |
{delete and type your answer} |
Vulnerability |
{delete and type your answer} |
Risk |
{delete and type your answer} |
Asset (3) |
Data stored in the cloud |
Threat |
{delete and type your answer} |
Vulnerability |
{delete and type your answer} |
Risk |
{delete and type your answer} |
Asset (4) |
Critical mission software |
Threat |
{delete and type your answer} |
Vulnerability |
{delete and type your answer} |
Risk |
{delete and type your answer} |
Asset (5) |
Employees |
Threat |
{delete and type your answer} |
Vulnerability |
{delete and type your answer} |
Risk |
{delete and type your answer} |
Asset (6) |
Hardware Firewalls |
Threat |
{delete and type your answer} |
Vulnerability |
{delete and type your answer} |
Risk |
{delete and type your answer} |