Retrieved from https://studentshare.org/information-technology/1607723-class-student-dicussions-answers
https://studentshare.org/information-technology/1607723-class-student-dicussions-answers.
Question Pavitar) I agree with Pavitar that the difference between quantitative risk analysis methods and qualitative risk analysis methods is with the data that are used in quantitative methods. In quantitative methods, data is used to measure quality. There are some data that have been collected to gauge how risky something is. In qualitative risk analysis, there is some scale that is used to measure the quality of a risk. The scale has been determined before and, so the parameters that are considered are looked into.
In the last pages, Pavitar also brings out the issue of security controls as an issue that should be considered when curbing security threats. There are various security controls that can be undertaken by a company. Question 2 (David .s)The argument that David raises concerns emerging security threats in the world today is right. The use of smartphones is on the increase. This has lead to attacks which are targeted at smart phones. With a smart phone also come wireless attacks, which are on the increase.
This is something that is becoming a threat even as many organizations adopt wireless technologies. Wireless attacks are becoming common (Fernandez & Jossy, 2004)n. David’s definition of the two approaches to defining risks make sense. Quantitative risk analysis involved putting a monetary value to the risk. Qualitative risk analysis involves identifying a risk and gauging how far the impacts it has. It is like describing the risk and its impact. There are no figures that are associated. This post is succinct and straight to the point.
Question 3 ( Julius )The post by Julius brings a social issue that is emerging. It is hard categorizing this threat under information technology but the explanation given by Julius warrants it to be under information technology. This is a new form of information technology threats that come from hackers trying to practice activism using technology. It is a new method indeed. ReferencesFernandez, E., & Jossy, E. (2004). An Overview of the Security of Wireless Networks. Toronto: Articy Publishers.
Read More