100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
Summary IT286 Unit1 Assignment.docx IT- 286 Unit 1 Assignment Purdue Global University “ IT286 Network Security Concepts In order to explain SLE x ARO = ALE, we must first discuss what the acronyms mean and what they represent. SLE represents how muc$7.49
Add to cart
Summary IT286 Unit1 Assignment.docx IT- 286 Unit 1 Assignment Purdue Global University “ IT286 Network Security Concepts In order to explain SLE x ARO = ALE, we must first discuss what the acronyms mean and what they represent. SLE represents how muc
116 views 0 purchase
Course
Purdue
Institution
Purdue University
IT286 Unit1 A IT- 286 Unit 1 Assignment Purdue Global University “ IT286 Network Security Concepts In order to explain SLE x ARO = ALE, we must first discuss what the acronyms mean and what they represent. SLE represents how much you expect to lose at any given time. In order to get ...
it286 unit1 assignmentdocx it 286 unit 1 assignment purdue global university “ it286 network security concepts in order to explain sle x aro ale
we must first discuss what the acronyms
Written for
Purdue University
Purdue
All documents for this subject (704)
Seller
Follow
helperatsof1
Reviews received
Content preview
IT- 286
Unit 1 Assignment
Purdue Global University– IT286
Network Security Concepts
In order to explain SLE x ARO = ALE, we must first discuss what the acronyms mean
and what they represent. SLE represents how much you expect to lose at any given time. In
order to get your SLE, it is comprised of two components which are asset value and exposure
factor. Asset value is represented by AV and Exposure factor is EF. So, with the following
formula, you can find SLE: SLE= AV x EF, in which also can be read (AV x EF) ARO= ALE.
Next, we have ALO which represents the annualized rate of occurrence, which means
what is the likelihood of this happening? You can base this off historical data of an event
happening. This now pushes our formula to SLE (AV x EF) x ARO = ALE. Now, ALE
represents the annual loss expectancy, which is how much one thinks or expects they will lose
over the course of a year. An example of this would be if I had a Software company and my
SLE is $5000 ($2500 x 2) and my ARO is (52weeks x .10), my ALE would be $26,000.
2. Risk Reduction
When it comes to risks and managing them, there are 5 main ways to reduce the overall
risk. The first way is risk limitations, which is the most common. This is a simple way a
company can limit their exposure by taking different actions. This is where a company realizes
, what the total risk is and acknowledges the risk acceptance. For example, in the Army, we are a
24/7 organization, however our systems still need to be updated. We push updates till nighttime
when less people are working, to limit the overall network outages that would occur during the
day, therefore the Army accepts the little bit of time at night they sacrifice to update. The next
way to reduce risk is risk avoidance. This simply refers to how companies will treat risk to avoid
or reduce to as minimal as possible. They will analyze the problem, deduce the total risk, and
either find a way to avoid it, or reduce the risk. The next means of risk reduction would be risk
transference. This is when a third party will assume responsibility for the loss if anything is to
happen. It is possible in some cases that the third party refuses to claim up to 100% of the risk
or loss, however, it is better to have someone taking responsibility for part of the loss than
none. The next way of risk reduction is risk mitigation. Risk mitigation is when you
intentionally take steps to avoid and reduce the overall risk. A good example of risk mitigation
is installing
cameras and signs on your house showing you are recording your house or what not if someone
breaks in. The last way that a company can reduce risk is to set in place different policies,
standards, and guidelines. Policies help set standards and help ensure that everyone will be
enforcing the security efforts and risk mitigations. Standards are set in place so that everyone
understands what their roles are and what the company expects from them, and the guidelines
tell them how to maintain those standards.
3. Cloud Computing
When it comes to cloud computing, the biggest factor to think about and consider is
security. Cloud environments face many threats just as much as traditional corporate physical
networks. The sensitive data that may get exposed can change the severity of the damage of
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller helperatsof1. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.49. You're not tied to anything after your purchase.