Risk assessment tools response | Computer Science homework help

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.


1. What software applications or “tools” would you use? 

The first tool in my kit would be Cacti. Cacti is a very well know network monitoring software. After searching the web this product was found in most articles concerning network monitoring. Monitoring the network is half the battle. The second half is interpreting and visualizing the information. Cacti provides the user to present that information on charts and graphs they can customize to their personal preference. To help mitigate risk I would also add Avast for online protection. This antivirus is excellent in protecting from viruses and malware. It also disperses information to users when new fixes for threats and vulnerabilities are found.

Windows would be the incorporated platform. Windows is the most universally used OS in the private and commercial sectors. Familiarity with the OS leads to less chance of human error, the toughest element to mitigate in a risk assessment plan.  

I would use AirMagnet for wireless network monitoring. It is a more proactive tool to use, which helps with identifying and combating threats. Total AV is a good antivirus I would user for the assessment. This product actively monitors and and some cases remove threats.



What software applications or “toolkit” would you use?

Right off the bat I would start to look for the best vulnerability scanner. I chose this because before I start to do any deep digging I want to know where I should start. This will also help me determine the scope of my assessment. The software I would choose for this would be Network Configuration manager due since it automatically finds issues across your network.

What platform (Operating System) would you use?

As far as the operating system I would probably go with windows. Although I could probably do just fine on a Mac I think windows would work best for me. 

How does this toolkit differ from that you would use for an application security assessment, wireless security assessment? You can list other types of related assessments if you know how you might adjust for the given scenario.

For an application assessment I would tailor my tools more toward applications and the rights they access within the computer. With a network assessment I would focus more on security of the network. 


Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more