Search for question
Question

/nIdentify the weakness in the data where Confidentiality, Integrity and Availability may be exploited or compromised. What would be the business impact? What are the key assets? What are the security concerns for the data? (vulnerabilities of the system, possible threat factors, etc.) Why would the data be of interest to hackers? What control measures would you use to mitigate the risks of being hacked? What kind of security policy should be in place to secure your data? In Week 3, you will address the following regarding the data structure: Describe the data (data blog, records, text, images, audio, video). How much data (how many transactions: minute, day, month, year, long term)? What are the policies to manage the data (access, lifespan, privacy, ...)? Who are the data owners, custodians, stewards? Who are the data users- and - How will they use it? What are the transactional performance response requirements for data use? Describe the types of transactions: Read, Write, Modification

Fig: 1