APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique….
Create an outline (or review one, if available) for a security risk assessment report. Identify the primary audience of each section.
1. Find an example of a security risk assessment Request for Proposal (RFP) online. Review the required services and discuss if this is truly a security risk assessment or a related activity. How would you modify or amend the RFP to align it with the goals of a security risk assessment?
2. Find an article on a recent computer security incident or breach.
(a) Identify as many of the following elements as possible: i. Threat agent/threat
ii. Vulnerability
iii. Assets affected
iv. Countermeasures applied
(b) What other safeguards could you recommend?
3. Create an outline (or review one, if available) for a security risk assessment report. Identify the primary audience of each section.