importance of knowing own system security posture

After reviewing the story attached, conduct research online into the various possibilities for conducting a risk assessment for organizations. Address the following:

  • Discuss the specific recommendations that you would make based on your personal experience and research.
  • Discuss the impact (from the perspective of various stakeholders) of the use of a risk assessment to stop an attack.
  • How can technology be used as an enabler for the risk-assessment process?
  • How can technology be a detractor for the risk-assessment process?
  • Provide specific examples of how you would conduct a risk assessment.
  • How can you apply the lessons that you learned from the story to your own company problem?

Note: Answer should be minimum of 400 words and maximum of 600 words. Plagiarism should be less than 20 percent.

“Order a similar paper and get 20% discount on your first order with us Use the following coupon “GET20”