NPTEL Cyber Security and Privacy Week 6 Assignment Answer 2023

admin
By admin

NPTEL Cyber Security and Privacy Week 6 Assignment Solutions

NPTEL Cyber Security and Privacy Assignment Answers 2023

NPTEL Cyber Security and Privacy Week 6 Assignment Answer 2023

1. Match 1 & 2 with A& B following

  1. Residual risk
  2. Risk appetite

A: The risk to information assets that remains even after current controls have been applied.
B: The quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility.
Choose the correct answer:

  • 1-A, 2-B
  • 1-B, 2-A
Answer :- For Answer Click Here

2. True or False:
The information technology community of interest must assist in risk management by configuring and operating information systems in a secure fashion.

  • True
  • False
Answer :- For Answer Click Here

3. The process of examining how each threat will affect an organization is called:

  • Risk assessment
  • Data classification
  • Threat assessment
  • Vulnerability classification
Answer :- For Answer Click Here

4. The probability that a specific vulnerability within an organization will be the target of an attack is known as:

  • Loss Magnitude
  • Manageability
  • Likelihood
  • Practicability
Answer :- For Answer Click Here

5. The calculation of the value associated with the most likely loss from an attack is called:

  • Annualised Rate of Occurrence (ARO)
  • Annualised Loss Expectancy (ALE)
  • Cost Benefit Analysis (CBA)
  • Single Loss Expectancy (SLE)
Answer :- For Answer Click Here

6. ———————-is the formal assessment and presentation of the economic expenditures needed for particular security control, contrasted with its projected value to the organization.

  • Feasibility analysis
  • Cost-benefit analysis
  • Risk-benefit analysis
  • Economic impact analysis
Answer :- For Answer Click Here

7. A document that compares the relative importance of prioritised assets to prioritised threats and highlights any weaknesses in the asset/threat pairs.

  • Threats-Vulnerabilities document
  • Threats-Vulnerabilities-Assets (TVA) worksheet
  • Threats-Vulnerabilities-Assets log file
  • Attack Vulnerability Asset document
Answer :- For Answer Click Here

8.

image 3
Answer :- For Answer Click Here

9. ——————- varies among organisations because they maintain different balances between the expense of controlling vulnerabilities and the possible losses if the vulnerabilities are exploited. The key for each organisation is to find the proper balance in its decision-making and feasibility analyses, to use experience and facts instead of ignorance or wishful thinking.

  • Risk appetite
  • Risk control
  • Residual Risk
  • Risk Assessment
Answer :- For Answer Click Here

10. Malware dictation Software has its own (Asset) internal personnel database behind a firewall. Industry reports indicate a 5 % chance of an attack. The information security and IT departments report that if the organization is attacked, the attack has a 15 % chance of success based on current asset vulnerabilities and protection mechanisms. The asset is valued at a score of 35 on a scale of 0 to 100, and information security and IT staff expect that 60 % of the asset would be lost or compromised by a successful attack, because not all of the asset is stored in a single location. You estimate that the assumptions and data are 90 % accurate. Calculating Risk.

  • 0.1575
  • 0.1733
  • 0.2887
  • 0.5575
Answer :-  For Answer Click Here

11. xyzbuy.com has an estimated value of Rs 50,00,000, as determined by an asset valuation and a cracker defacement scenario indicates that a deliberate act of sabotage or vandalism could damage 25 per cent of xyzbuy.com, then the single loss expectancy for the xyzbuy.com would be?

  • 16,50,000
  • 15,20,000
  • 11,11,000
  • 12,50,000
Answer :- For Answer Click Here
Course NameCyber Security and Privacy
CategoryNPTEL Assignment Answer
Home Click Here
Join Us on TelegramClick Here
Share This Article
Leave a comment