importance of knowing own system security posture

After reviewing the story attached, conduct research online into the various possibilities for conducting a risk assessment for organizations. Address the following:

  • Discuss the specific recommendations that you would make based on your personal experience and research.
  • Discuss the impact (from the perspective of various stakeholders) of the use of a risk assessment to stop an attack.
  • How can technology be used as an enabler for the risk-assessment process?
  • How can technology be a detractor for the risk-assessment process?
  • Provide specific examples of how you would conduct a risk assessment.
  • How can you apply the lessons that you learned from the story to your own company problem?

Note: Answer should be minimum of 400 words and maximum of 600 words. Plagiarism should be less than 20 percent.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount