Assess risk based on the likelihood of adverse events and the effects on information assets when events occur.

he Invisible Man analysis of race and ethnicity in the book.
July 25, 2019
“Invisible hand” in the instant case is being used a metaphor for government control. So you believe that FAR 15 is too onerous?
July 25, 2019

Assess risk based on the likelihood of adverse events and the effects on information assets when events occur.

Question Description

The Invisible Threat

Learning Objective: Assess risk based on the likelihood of adverse events and the effects on information assets when events occur.

Assignment Requirements

Watch the 57-minute video, Cybercrime: The Invisible Threat, from Films on Demand.  Take notes during the viewing to identify and assess risks associated with the threats presented in the video.

  • Introduce the term cybercrime and why IT professionals should be concerned about it.
  • Identify the threats/vulnerabilities presented in the video.
  • Discuss if the threats controllable.
  • What part of risk management addresses these threats?
  • Can they be quantified?
  • Should SETA come into play?.
  • Conclude with your recommendation on how your organization can address these risks.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

Note: It’s not possible to share the Video so i am posting the complete Transcript of that 57min Video.