Create a minimum 1-page table in Microsoft® Word or Word Compatible identifying a minimum of 6 threats, using the column headers and details below:

Column Headers 

  1. Threat 
  2. Threat to Type of Data 
  3. Confidentiality/Integrity/Availability 
  4. Mitigation Suggestion 

Details Within Your Table 

  1. Identify relevant threats. List 1 per column. 
  2. Determine the type of data threatened (data-at-rest, data-in-transit, or processing) in the column. 
  3. Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column. 
  4. Describe the mitigation plan in 2 to 3 sentences in the column. 

Example Table 

Example Table

Include a short paragraph that highlights 2 access control techniques or policies that enforce security. 

Cite at least 2 resources to support your assignment. 

Format your assignment according to APA guidelines.

Review Rubric to assure all requirements are met.

"Get 15% discount on your first 3 orders with us"
Use the following coupon
"FIRST15"

Order Now