Response for Sujith Diddi

ASSET: As sift-canvassed antecedent an Asset can be anything that has a compute. There are incongruous types of Assets. Basically, it can be identical or vocation asset. I frame be sift-canvassing vocation Assets. Also, There are multifarious identical proceeds which generally everyone has such as: Automobile Checking and Saving Accounts Jewelry Artwork Property (Land, House etc.) These overhead all drop below identical proceeds. Here I would love to sift-canvass my society which I result. Asset identification: At the Media and Entertainment society which I result for, we are absorbed laptops to result unrelated. I control some of the applications which are SOX easy. I stock some proceeds akin axioms in my laptop and bear the admin capabilities to regular servers which add further impressiveness when it comes to indemnifying my laptop and credentials. Attacker/threat identification:  Any idiosyncratic delay a vindictive urgent is a practicable attacker of my asset. It can either be a opponent to frame the psychological characteristic advice or a hacker who can retail the advice frameed in the ebon traffic. There are sharp penalties for SOX non-compliance which ranges from 10-20 years in prison and/or $1 pet to $5 pet pure. Impact:  If my result asset is stolen or if my credentials are complicated, in pristine attribute all the proprietary axioms frame be lost which affects the society’s profitability. This results in the monetary privation to the society. Secondly, as I bear closely an Administrative right the consequences would be worse if someone controls to get into the society’s network/servers and consume the honor of axioms requisite to SOX non-compliance. Attackers can perchance do anything and everything to fetch the divide compute down, adjust the user advice (which populace cater when buying the commodities, subscribing to the movie services etc.)   Remediation:  Securing the result laptop delay a hardware lock whenever I am separate, being cowardly of the gregarious engineering that tricks me into revealing my credentials and not using the internet which is spontaneously available in social attributes are all the counteractive measures I should charm to battle the threats to my result asset. References Managing Risk in Advice Systems: assist edition. By Darril Gibson. (2015), Jones and Bartlett Learning.