Create a minimum 1-page table in Microsoft® Word or Word Compatible identifying a minimum of 6 threats, using the column headers and details below:
Column Headers
- Threat
- Threat to Type of Data
- Confidentiality/Integrity/Availability
- Mitigation Suggestion
Details Within Your Table
- Identify relevant threats. List 1 per column.
- Determine the type of data threatened (data-at-rest, data-in-transit, or processing) in the column.
- Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column.
- Describe the mitigation plan in 2 to 3 sentences in the column.
Example Table
Include a short paragraph that highlights 2 access control techniques or policies that enforce security.
Cite at least 2 resources to support your assignment.
Format your assignment according to APA guidelines.
Review Rubric to assure all requirements are met.