+1(978)310-4246 credencewriters@gmail.com

Risk Handling techniques:  Avoid, sharing/transferring, Mitigating, and Accepting

Part 1:  Reasonableness and Risk.

Assume you have are the only person in your family that is earning money.  You and your spouse have decided that your spouse will stay at home and teach your three kids (7, 9, and 12 years old).  Your commute is 30 miles each way in Northern Virginia.  You own an average car that is four years

old and you still owe over $10k.

Answer the following question(s):

1.     Identify and discuss three threats to the current situation.

2.      You just received notice from your insurance company that your premiums are going to triple for the next year if you have another accident in the next 12 months.  Identify two risk-handling techniques to deal with this potential risk to your financial situation.

Part 2:  Risk Handling – The mailbox decision.

You live in a small community.  In the last week, several mailboxes were destroyed by an unknown threat.  How are you going to handle the potential risk of your mailbox being destroyed in the future?  Justify at least one potential strategy for each risk handling technique.  Recommend the best strategy and why you chose that strategy.


U.S. Compliance Laws

Part 1

: The first part of this lesson provides an overview of U.S. compliance laws that are relevant to IT security. Select one of the laws below and discuss its purpose, why is it important, and research a current event or news story relating to the law to share with the class.

Federal Information Security Modernization Act (FISMA)

Health Insurance Portability and Accountability Act (HIPAA)

Gramm-Leach-Bliley Act (GLBA)

Sarbanes-Oxley Act (SOX)

Family Educational Rights and Privacy Act (FERPA)

Children’s Internet Protection Act (CIPA)

Children’s Online Privacy Protection Act (COPPA)

Part 2

: Threats. In chapter 2, the textbook discusses the different categories of threats.  NIST SP 800-30  (page D-2) lists several Threat Sources (

click here (Links to an external site.)

).  Review these two and determine what you consider in your experience to be the greatest threat.  Provide an example of this threat in action.  This does not necessarily need to be a specific cybersecurity-related example.  In January of 2022, we experienced one of these threats-You can’t use the snowstorm and related power outages as an example.


Part 1:  Risk Management.  ”

Risk Management is not Risk Elimination”.   What does this mean?  Do you agree or disagree with the statement?  Defend your answer.   Note: This is not a yes/no question.

Part 2


The Risk Management Process

(See chapter 1 page 20)

This week will start by looking at Risk management allowing you to reflect on your current situation.  Please do not share any information that you do not want to share about yourself.

In the coming weeks we will look at Risk Management Planning, Risk Assessment, Risk Mitigation, and the Business Continuity Plan.

This week look at your personal situation and come up with a short Risk Management plan:

Identify key assets in your life (3)

Identify threats (2)

Identify vulnerabilities (2)

Identify the likelihood of a threat exploiting a vulnerability (Simple low, moderate, high is fine).

Identify the impact of a threat exploiting a vulnerability (again low, moderate or high)

What risk handling strategy will you use (This should be one of avoid, shared, mitigated, or accepted)

What controls/countermeasures will you use to reduce the vulnerability or impact

How will you test these controls and their effectiveness?

error: Content is protected !!