Week 6 assignment Assignment Instructions

Instructions:

This assignment will use NIST Special Publication 800-30 (available at http://csrc.nist.gov/publications/drafts/800-30-rev1/SP800-30-Rev1-ipd.pdf or in the Course Resources area) as its basis.

The selected computing system can be your personal home network (e.g., from ISP appliance to connections within your home location), a work oriented network, or a public network (e.g., public library, commercial venue, free Wifi hotspot).

In this assignment, initial creation and population of adversarial and a non-adversarial risk assessment tables patterned after Table I-5 and Table I-7 in NIST SP 800-30 will be performed.

This assignment is intended to prepare for the Week 8 applied risk assessment assignment, wherein you will use these populated tables to gain insight in the selected system's risks, apply knowledge from this course, apply relevant information security metrics, and discuss the considerations that should go into an actual information security risk assessment discussion — limited to adversarial and non-adversarial threats. This means that you should fill out those two templates as a minimum as part of your The deliverable for this assignment should be a brief description of your selected information system and Tables I-5 and I-7 created and populated.