250 WORDS
Perform an abbreviated risk management study on your personal computer. Conduct an asset identification, threat identification, vulnerability appraisal, risk assessment, and risk mitigation. Under each category, list the elements that pertain to your system. What major vulnerabilities did you uncover? How can you mitigate these risks? What is your plan for securing your personal system? Are you going to implement the plan? Why or why not?
Reply to responses. 75 to 100 words
A. Mireille
Hello everyone,
After performing abbreviated risk management on my personal computer, I discovered the following:
1. Asset Identification: I found PII like phone number, full name, email address, debit card information, and home address.
2. Vulnerability Appraisal: My system needs an update, and I need to use a password manager.
3. Threat Identification: Lots of spam emails and viruses
Risk assessment: Firewall settings can easily be compromised, the probability that malware may go undetected is high, and some of my passwords are compromised.Risk mitigation: To mitigate these risks, I will need to install a password manager, activate the Malwarebytes license, and always keep my system updated.To secure my personal system, I plan on making sure the firewall is enabled before I go online, activating the Malwarebytes license, using complex and secure passwords, always keeping my system up-to-date, making sure I keep ignoring email messages from unknown parties, and never clicking on links or open attachments that accompany them, making sure my home network is secure, and developing the habit of using two-factor authentification. For better protection from hackers, I plan on implementing this plan.
B. Ethan
Asset Identification: Various forms of PII: Addresses, passwords, saved website loginsThreat Identification: Outdated software, phishing emails, potentially malicious filesVulnerability appraisal: Lacking a licensed & activated anti-virus other than Windows’, Potentially vulnerable firewall configurations, default DNS provider
Risk assessment: Firewall settings could be breached, Potential malware may go undetected, DNS queries are not private
Risk mitigation: Active a Malwarebytes license, update & configure Windows Defender & Firewall, use Cloudflare Warp for private, fast, and filtered DNS queries.
One of the major vulnerabilities that I found on my system is the lack of an active & licensed antivirus service. I use Malwarebytes although with the free version, scans must be completed manually and there is no active protection. This risk can be easily mitigated through activating a Malwarebytes license. I also plan to use a password manager and remove any stored passwords from websites. I am going to implement the plan after choosing a password manager. I think these simple yet effective steps will greatly improve the risk mitigation on my computer.
C Hayden
Asset identification: Payment information, addresses, PII.
Threat identification: Viruses, firewall configurations, security patches.
Vulnerability appraisal: Firewall being configured wrong could lead to a data breach on my computer, and software being out of data could also lead to a breach.
Risk assessment: The firewall being configured improperly is a major risk. Software being out of date is a moderate risk. Risk mitigation: Configure the firewall for personal use, and update software.The biggest risks on my computer are the firewall not being configured to the perfect settings and having potential ports open that could lead to a breach. Additionally, some of the software on my computer needed to be updated, one of these updates being a security patch. To mitigate these risks I could look up ports that are not required for my current network, and update software that needs to be updated. The plan to secure my personal system is to set up my firewall and update my software. I will be implementing my plan, as updating software is not very difficult, and the firewall is a good idea
WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU
GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class
CLICK HERE TO MAKE YOUR ORDER on Conduct an asset identification, threat identification, vulnerability appraisal, risk assessment, and risk mitigation
TO BE RE-WRITTEN FROM THE SCRATCH