Use the Sample Problem Description II file on Blackboard. I need the report 2’s table in the attached word document to be completed .what we have so far and missing the the threats for majority of the assets in the table like content management system, scheduling data, windows machine, etc.
The document should contain a threat analysis. A threat analysis is NOT a vulnerability analysis.
- A vulnerability is an actual weakness or flaw in an information system that can be exploited. Example: â€œOpenJPEG through 2.3.1 has a heap-based buffer overflowâ€.
- A threat is a potential negative event that can lead to damage or loss of an asset. Example: â€œPatient records are accessed by an unauthorized individualâ€.
Please come up with different threats to the ones in Sample Problem Description II file when filling the report table