Please identify the following, focusing on step 4, remediation.  Identify if that security control you are recommending to protect your asset is preventive, detective, or corrective. 1.  Asset identification:  Identify what might be a personal or business asset (think of something you have at home that you would like to protect, or something that your company has that needs protection). 2.  Attacker/threat identification:  Who are the likely attackers to that asset? What other threats are there that can negatively impact that asset?  Remember that an attacker is always a person with intent, and is only one type of threat – we also have natural disasters, accidents, etc. that are not “attacks” as they don’t have malicious intent behind them. 3. Impact:  Identify the impact if the attack or threat was “actualized” (happened). Would there be a monetary loss? Loss of confidence (in the event of a business breach)? Fine (in the event of a loss of PII or PHI)? 4.  Remediation:  Research and recommend a security control (i.e. firewall, lock on a door, etc.) that can remediate (prevent, detect, correct, etc.) the attack or threat. Purchase the answer to view it

Step 4 of the given exercise focuses on remediation, which involves finding a security control to protect the identified asset. In order to determine the appropriate security control, it is important to understand whether it is preventive, detective, or corrective in nature.

To begin with, asset identification involves identifying a personal or business asset that needs protection. This can be anything from a valuable possession at home to a crucial component or information system within a company.

Secondly, attacker/threat identification involves identifying the likely attackers who may target the asset. It is important to remember that an attacker is always a person with intent, but there can also be other threats that negatively impact the asset. These threats can include natural disasters, accidents, or technical failures that do not involve malicious intent.

The third step involves understanding the impact if the attack or threat were to occur. This impact can be assessed in terms of monetary loss, loss of confidence, or potential fines. For example, in the event of a business breach, there may be a loss of customer confidence or a decline in stock price. In cases where personally identifiable information (PII) or protected health information (PHI) is compromised, there may be legal repercussions in the form of fines or penalties.

Finally, the fourth step revolves around remediation. This step requires researching and recommending a security control that can mitigate or prevent the identified attack or threat. The recommended security control can fall into one of the following categories: preventive, detective, corrective, or a combination of these.

A preventive control aims to stop an attack or threat from occurring in the first place. This can be achieved through measures such as access controls, firewalls, encryption, or physical barriers like locks on doors.

A detective control helps to identify and recognize attacks or threats that have already occurred. Examples of detective controls include intrusion detection systems, log monitoring, or security cameras.

A corrective control is implemented after an attack or threat has taken place and aims to restore systems or processes to their normal state. This can involve activities such as patching vulnerabilities, removing malware, or restoring backups.

It is important to note that the choice of the security control will depend on various factors such as the nature of the asset, the level of risk, available resources, and the cost-effectiveness of the control.

In summary, step 4 of the exercise involves recommending a security control to protect the asset identified in step 1. The recommended control can be preventive, detective, or corrective, depending on the specific requirements and characteristics of the asset and the associated risks.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.

Click Here to Make an Order Click Here to Hire a Writer