{"id":24815,"date":"2024-05-08T05:22:56","date_gmt":"2024-05-08T05:22:56","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/security-risk-assessment-and-recommendations-part-b-see-attachments-for-more-information\/"},"modified":"2024-05-08T05:22:56","modified_gmt":"2024-05-08T05:22:56","slug":"security-risk-assessment-and-recommendations-part-b-see-attachments-for-more-information","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/security-risk-assessment-and-recommendations-part-b-see-attachments-for-more-information\/","title":{"rendered":"Security risk assessment and recommendations Part B. See attachments for more information"},"content":{"rendered":"<p style=\"margin-right: 0px; margin-bottom: 1em; margin-left: 0px; font-size: 13.3333px; cursor: auto; color: inherit;\"><span style=\"font-weight: inherit; font-size: 12pt; cursor: auto; color: inherit;\">In your<b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Part B<\/b><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>submission, you will use the Risk Assessment template that you created in Part A to evaluate the threats and associated vulnerabilities\/weaknesses and potential consequences you uncovered while conducting your assessment of the existing security measures. Make any adjustments to the language and other areas that are needed to ensure you maintain a security focus. You will use this and any other appropriate information available to conduct your calculations for the<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><b style=\"font-weight: bold; cursor: auto; color: inherit;\">existing overall Risk associated with the key assets in your location (the employees, the facility\/building, product, trade secrets, etc<\/b>.<b style=\"font-weight: bold; cursor: auto; color: inherit;\">)<\/b><\/span><\/p>\n<p style=\"margin-right: 0px; margin-bottom: 1em; margin-left: 0px; font-size: 13.3333px; cursor: auto; color: inherit;\"><span style=\"font-weight: inherit; font-size: 12pt; cursor: auto; color: inherit;\">Your Risk Assessment Scores will then be used to<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><b style=\"font-weight: bold; cursor: auto; color: inherit;\">identify the<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><u style=\"cursor: auto; color: inherit;\">four major threats<\/u><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>(those individual threats with the highest Risk Scores).<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/b>In determining potential threats to evaluate you may find it beneficial to examine historical events that have negatively impacted assets at your facility or similar locations. You should also consider information or intelligence you may have received regarding potential threat to the location\/facility you are evaluating.&nbsp;<b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/b>After&nbsp; &nbsp; &nbsp; &nbsp; identifying your greatest threats,<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><b style=\"font-weight: bold; cursor: auto; color: inherit;\">you will then discuss recommended security measures or improvements that will minimize and\/or mitigate the associated risk to your assets that are associated with each of these threats<\/b><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In your&nbsp;Part B&nbsp;submission, you will use the Risk Assessment template that you created in Part A to evaluate the threats and associated vulnerabilities\/weaknesses and potential consequences you uncovered while conducting your assessment of the existing security measures. Make any adjustments to the language and other areas that are needed to ensure you maintain a security [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[57],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/24815"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=24815"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/24815\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=24815"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=24815"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=24815"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=24815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}