100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary IT286 Unit1 Assignment.docx IT- 286 Unit 1 Assignment Purdue Global University “ IT286 Network Security Concepts In order to explain SLE x ARO = ALE, we must first discuss what the acronyms mean and what they represent. SLE represents how muc $7.49   Add to cart

Summary

Summary IT286 Unit1 Assignment.docx IT- 286 Unit 1 Assignment Purdue Global University “ IT286 Network Security Concepts In order to explain SLE x ARO = ALE, we must first discuss what the acronyms mean and what they represent. SLE represents how muc

 116 views  0 purchase
  • Course
  • Institution

IT286 Unit1 A IT- 286 Unit 1 Assignment Purdue Global University “ IT286 Network Security Concepts In order to explain SLE x ARO = ALE, we must first discuss what the acronyms mean and what they represent. SLE represents how much you expect to lose at any given time. In order to get ...

[Show more]

Preview 2 out of 6  pages

  • April 29, 2021
  • 6
  • 2020/2021
  • Summary
avatar-seller
IT- 286

Unit 1 Assignment

Purdue Global University– IT286


Network Security Concepts




In order to explain SLE x ARO = ALE, we must first discuss what the acronyms mean

and what they represent. SLE represents how much you expect to lose at any given time. In

order to get your SLE, it is comprised of two components which are asset value and exposure

factor. Asset value is represented by AV and Exposure factor is EF. So, with the following

formula, you can find SLE: SLE= AV x EF, in which also can be read (AV x EF) ARO= ALE.


Next, we have ALO which represents the annualized rate of occurrence, which means

what is the likelihood of this happening? You can base this off historical data of an event

happening. This now pushes our formula to SLE (AV x EF) x ARO = ALE. Now, ALE

represents the annual loss expectancy, which is how much one thinks or expects they will lose

over the course of a year. An example of this would be if I had a Software company and my

SLE is $5000 ($2500 x 2) and my ARO is (52weeks x .10), my ALE would be $26,000.


2. Risk Reduction


When it comes to risks and managing them, there are 5 main ways to reduce the overall

risk. The first way is risk limitations, which is the most common. This is a simple way a

company can limit their exposure by taking different actions. This is where a company realizes

, what the total risk is and acknowledges the risk acceptance. For example, in the Army, we are a

24/7 organization, however our systems still need to be updated. We push updates till nighttime

when less people are working, to limit the overall network outages that would occur during the

day, therefore the Army accepts the little bit of time at night they sacrifice to update. The next

way to reduce risk is risk avoidance. This simply refers to how companies will treat risk to avoid

or reduce to as minimal as possible. They will analyze the problem, deduce the total risk, and

either find a way to avoid it, or reduce the risk. The next means of risk reduction would be risk

transference. This is when a third party will assume responsibility for the loss if anything is to

happen. It is possible in some cases that the third party refuses to claim up to 100% of the risk

or loss, however, it is better to have someone taking responsibility for part of the loss than

none. The next way of risk reduction is risk mitigation. Risk mitigation is when you

intentionally take steps to avoid and reduce the overall risk. A good example of risk mitigation

is installing

cameras and signs on your house showing you are recording your house or what not if someone

breaks in. The last way that a company can reduce risk is to set in place different policies,

standards, and guidelines. Policies help set standards and help ensure that everyone will be

enforcing the security efforts and risk mitigations. Standards are set in place so that everyone

understands what their roles are and what the company expects from them, and the guidelines

tell them how to maintain those standards.


3. Cloud Computing


When it comes to cloud computing, the biggest factor to think about and consider is

security. Cloud environments face many threats just as much as traditional corporate physical

networks. The sensitive data that may get exposed can change the severity of the damage of

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller helperatsof1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$7.49
  • (0)
  Add to cart