100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

Unit 11 Cyber security risk assessment example.

Rating
-
Sold
-
Pages
7
Uploaded on
17-10-2024
Written in
2024/2025

Within this document, I have completed an example for Unit 11 Cyber security Activity 1 which is the Risk assessment. In this scenario, I have based it off of a home network and identified threats which a home network may be vunerable to and the severity of these threats.

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
October 17, 2024
Number of pages
7
Written in
2024/2025
Type
Other
Person
Unknown

Subjects

Content preview

Set Task Electronic Template – Unit 11

Task A - Activity 1 Template: Risk assessment of the networked system

Risk severity matrix

Very likely Medium High Extreme
Probability Likely Low Medium High
of threat Unlikely Low Low Medium
occurring
Minor Moderate Major
Size of the loss


Assessment

Threat number. 1
Risk severity. Extreme
Threat title. Phishing
Probability. Very likely
Potential size of Major
loss / impact
level.
Explanation of Phishing is a very likely to occur as the phishing threat can be
the threat in sent through emails and text messages which the victim would
context. click and the hacker will gain the victims information and data
without the victim knowing which will cause a major impact level.

, Set Task Electronic Template – Unit 11

Task A - Activity 1 Template: Risk assessment of the networked system

Risk severity matrix

Very likely Medium High Extreme
Probability Likely Low Medium High
of threat Unlikely Low Low Medium
occurring
Minor Moderate Major
Size of the loss


Assessment

Threat number. 2
Risk severity. High
Threat title. Man in the Middle attack
Probability. Likely
Potential size of Major
loss / impact
level.
Explanation of The man in the middle attack is quite likely to occur as an attack
the threat in usually occurs due to a weak encryption. This will usually happen
context. through public WIFI which usually has weak encryption. The size
of loss will also be major due to the attack positioning himself
between the user and a web application and will take the
information and data which is travelling through the connection
which in some cases can result in major loss and the impact level
will also be huge.




Set Task Electronic Template – Unit 11
$11.48
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
awaismustafa
5.0
(1)

Get to know the seller

Seller avatar
awaismustafa Bradford College
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
1 year
Number of followers
0
Documents
13
Last sold
1 week ago
BTEC Level 3 Information Technology

Hi there, I provide assignments completed to high standards for the BTEC Level 3 Information Technology course at an affordable price. All my material is guaranteed to provide excellent support during the completion of your assignments. Do not hesitate to contact me if there are any issues as I am more than happy to help. Please Note: Do NOT copy the assignments word for word as this may flag up as plagiarism.

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions