You Are Eligible For 15% Discount This Month!
1. Find an example of a security risk assessment Request for Proposal (RFP) online. Review the required services and discuss if this is truly a security risk assessment or a related activity. How would you modify or amend the RFP to align it with the goals of a security risk assessment?2. Find an article on a recent computer security incident or breach.(a) Identify as many of the following elements as possible: i. Threat agent/threatii. Vulnerabilityiii. Assets affectediv. Countermeasures applied(b) What other safeguards could you recommend?3. Create an outline (or review one, if available) for a security risk assessment report. Identify the primary audience of each section.