What are the five tasks required to get ready for a risk assessment? Explain each one in your own terms and why the task is important.
2) Discuss the threats associated with privileged user accounts? Please support your views from sources other than the assigned reading and also the text book.
3) Using fig 3 – the generic risk model in the document and the threat identified in question 2. Identify the risks at the Organizational level, business process level and information system level.
4) Based on the risks identified, recommend the information system policies that would be required. You do not need to write the policy in detail, simply provide the title and one sentence describing the policy.
.