- Please pick an asset such as a specific software, hardware component or a network protocol and apply the NIST SP800-30 framework by going through the following steps:
a. Data collection: Creation of asset survey profile, control survey profile and threat vulnerability matrix for the asset.
b. Data analysis: Impact, control and Likelihood analysis, risk score calculation.
c. Risk classification and threat vulnerability pair ranking for the asset.
d. Report generation: Use the format described in the sixth lecture.
4 freelancers are bidding on average $65 for this job
Hello, i am Cyber Security Expert with 6 years of experience and can these 4 tasks. send me your lectures and contact me only if need quality work. Thank you