Best Practices for Risk Assessment and Threat Management

This assignment has 2 sections each section should have 200-225 words totally 400-450 words answering the questions. The references are below

Section 1
Review the workflow steps for the security risk review in Chapter 12 in Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. What is the overall objective of the questionnaire that is distributed to primary contacts? How important is ethics when answering the various questions in the questionnaire? Provide an example of an unethical response and its impact to a company’s security posture.

Section 2 – Review the differences between an operational assessment and a third-party assessment. Which has more value to an organization? Why? Explain the difference in accuracy between the two results.

Sources

Use for Section 1 – Wheeler, E. (2011). Security risk management: Building an information security risk management program from the ground up. Waltham, MA: Syngress. ISBN-13: 9781597496155 – PDF Attached

Use any of the three for a second source
The Threat and Vulnerability Management Maturity Model – PDF Attached

Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach,” by the Joint Task Force Transformation Initiative (2010) – PDF Attached

Guide for Conducting Risk Assessments,” by the Joint Task Force Transformation Initiative (2012) – PDF Attached

Last Completed Projects

topic title academic level Writer delivered