Identify threats, vulnerabilities, and any mitigations you notice in place. This is very informal so no need to do any side research on crime statistics or incident report history or anything like that.

Identify threats, vulnerabilities, and any mitigations you notice in place. This is very informal so no need to do any side research on crime statistics or incident report history or anything like that.
May 19, 2021 Comments Off on Identify threats, vulnerabilities, and any mitigations you notice in place. This is very informal so no need to do any side research on crime statistics or incident report history or anything like that. Uncategorized Assignment-help
Words: 355
Pages: 2
Subject: Uncategorized

Identify threats, vulnerabilities, and any mitigations you notice in place. This is very informal so no need to do any side research on crime statistics or incident report history or anything like that. This is an observation exercise to get you thinking about the things that standout that you may have never noticed before and how threat, vulnerability, and potential impacts, when considered against control measures in place, are used to form an initial risk rating. Use the relevant columns in the risk matrix template to input what you come up with and write a report on what you identify (1 page). Be specific in setting the scope of your event and assessment. Something like: This risk analysis assignment is based on going to watch my niece play softball. It took place between 1 and 4 PM on a Saturday in Kingwood, TX. The ballpark was located at the local community college behind the student parking area. Observations are from the time I parked until the time we exited the parking lot to return home. The primary focus was on the personal security of the players and spectators, the team vehicles in the parking lot, and the surrounding area of the ball field including concessions and restrooms. Also considered was the protection of personal data and information security… *Be as detailed as you think you need to be for someone else to understand what you were considering and why what you identified was relevant. Then add additional paragraphs or bulletized lists, charts, or inserted columns from your threat risk matrix (template in folder) that convey identified threats (3 or 4), relevant vulnerabilities, and controls you observe to be in place. If you have room, list what you think the probability of one of the events taking place might be, and if it did, how severe would the impact be. Events don’t have to be complex. A few other examples might be: 1. Fueling your vehicle 2. Riding your bike to work 3. Going through a drive thru 4. Shopping at a local store Turn in your report (1 page, or whatever it takes to convey your findings) by clicking on the assignment header above