Sunday, March 3, 2013

Week 12

Over the past twelve weeks I have learned how to properly identify threats and vulnerabilities within a system and provide recommendations as to how to minimize them.  I also learned how to assess the risks associated with those threats and vulnerabilities and prioritize them based on the affect they will have on the system if exposed or exploited.  During the course I learned how to create action plans on how to minimize the vulnerabilities and threats.  The most difficult part of this course was creating a process model.  There were so many things that need to be covered in a process model such as the physical security of the building and the network itself.  Dependent upon the type of business you have to consider the legal aspect of things as well.  A process model was to be well thought out and planned.  Other than that the course was pretty straight forward.

No comments:

Post a Comment