SAU Vulnerability And Risk Assessment Table

×Vulnerability and Risk Assessment
Vulnerability and Risk Assessment
Assignments
Assignments
Assig_1
Evaluating Risk Handling Strategies
Learning Objectives and Outcomes
Evaluate appropriate risk-handling strategies for a given scenario.
Assignment Requirements
The X-Axis is a renowned private cancer hospital located in Las Vegas. The hospital
maintains a critical database in-house that includes patient data for all patients.
You are the IT security manager at X-Axis. The power from the city to the company’s data
center has been unstable in recent months. The database was offline twice due to power
issues, once for 6 hours and once for 10 hours. You are evaluating the risk to the organization
of continued power issues and database availability.
For this assignment:
1. Create a table in Microsoft Word similar to the following for avoidance, transference,
and mitigation risk-handling strategies.
Risk Handling Strategy
Description
Avoidance
Transference
Mitigation
Fill in each empty cell with a description of at least two appropriate strategies or actions.
Self-Assessment Checklist
I researched risk avoidance, transference, and mitigation techniques.
I completed the table with at least two descriptions of strategies or actions for risk
avoidance, transference, and mitigation.
Cite and reference your work using APA style.
Assig-2

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER