Risk Assessment 1
Risk Assessment 1
1 INFORMATION ASSESTS
paper documents
digital documents
password
digital files
database
2 PAPER ASSETS
policies
contracts
3 SOFTWARE ASSETS
applications
operating system
4 PYSICAL ASSETS
mouse
keyboards
chairs
ethernet cables
power supply
5 PEOPLE
students
technicians
lecturers
6 COMPANY IMAGE AND REPUTATION
7 SERVICES
learning
internet service
computing service
VULNERABILITIES I-V PAIRING
JARAMOGI OGINGA ODINGA UNIVERSITY OF SCIENCE AND TECHNOLOGY
COMPUTER SECURITY AND FORENSICS
1 INFORMATION ASSESTS
paper documents theft,forgery,i
digital documents ransomware attack
password phishing
database ransomware attack
2 PAPER ASSETS
lab rules theft
3 SOFTWARE ASSETS
applications exploit kits
operating system botnets
4 PYSICAL ASSETS
mouse theft
keyboards theft
chairs theft
ethernet cables theft
Air conditioner theft
Monitors theft
System Units theft,ransomware
projector theft
5 PEOPLE
students social engineering attack
technicians social engineering attack
lecturers
6 COMPANY REPUTATION
image of the lab
7 SERVICES
learning power loss
internet access social media attacks,trojans
computing service malware
SCIENCE AND TECHNOLOGY
ORENSICS
VULNERABILITIES
unsecured documents
not encrypted
weak mechanisms
not password protected
outdated applications
old operating systems
na