1. Before evaluating the risk assessment, there are performance steps that help guide the project manager to identify the threats and vulnerabilities targeting a specific system. One of those steps involves determining the impact of a risk. Why is this step so important in this process? Provide an example if it will help in the explanation.
Your response must be at least 200 words in length.
2. According to the unit readings, there are two methods to measure risk assessments. Summarize the two different risk assessment measures, and explain which one would provide a dollar amount figure for calculating assets. Why would this measurement be easier?
3. Safeguarding controls or providing security enhancements to controls are countermeasures used to prevent or reduce threats and vulnerability attacks from hackers. Summarize the three control categories.
Your response must be at least 200 words in length.
Section 2(Chapters 12 and 13):
1.What are the sections that are encapsulated in the business continuity plan (BCP)? Explain one of those sections and why is this important to consider in the BCP.
2. The critical business functions are captured within the business impact analysis (BIA) in mitigating risks. Summarize the four areas that help directly support the business continuity plan (BCP).
3. The business impact analysis (BIA) helps the organization identify the critical IT systems and assets. Briefly, explain the three critical business functions that are associated with the BIA.
4. Explain the two categories of outages that affect the business of the organization. Provide one example for each of the categories.
Your response must be at least 200 words in length.