For each of Harry & Mae’s critical assets that you identified and listed previously, list the identified vulnerabilities and potential threats. Only list the vulnerabilities and threats associated with the assets. Do not include recommendations, controls, or methods for mitigating the risks.
Additionally, your report should include:
- For each vulnerability, briefly describe the weakness and how it could affect the company and/ or its operations.
- For each vulnerability, rate the severity or impact of the weakness based on a ranking of low, medium, or high.
- For each vulnerability, describe how the threat that might exploit the vulnerability. Choose the threat from the categories presented in class.
Write your report as if you were going to give it to your client: Harry & Mae’s IT Staff and Executives. Start your report with a brief introduction explaining its contents.


0 comments