I need support with this Computer Science question so I can learn better.
Use the Sample Problem Description II file on Blackboard. I need the report 2’s table in the attached word document to be completed .what we have so far and missing the the threats for majority of the assets in the table like content management system, scheduling data, windows machine, etc.
The document should contain a threat analysis. A threat analysis is NOT a vulnerability analysis.
- A vulnerability is an actual weakness or flaw in an information system that can be exploited. Example: “OpenJPEG through 2.3.1 has a heap-based buffer overflow”.
- A threat is a potential negative event that can lead to damage or loss of an asset. Example: “Patient records are accessed by an unauthorized individual”.
Please come up with different threats to the ones in Sample Problem Description II file when filling the report table