{"id":27103,"date":"2021-07-31T00:57:34","date_gmt":"2021-07-31T00:57:34","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2021\/07\/31\/wk-5-signature-assignment-devils-canyon-part-2-due-mon-wk-5-signature-assignment-devils-canyon-part-2\/"},"modified":"2021-07-31T00:57:34","modified_gmt":"2021-07-31T00:57:34","slug":"wk-5-signature-assignment-devils-canyon-part-2-due-mon-wk-5-signature-assignment-devils-canyon-part-2","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2021\/07\/31\/wk-5-signature-assignment-devils-canyon-part-2-due-mon-wk-5-signature-assignment-devils-canyon-part-2\/","title":{"rendered":"Wk 5 &#8211; Signature Assignment: Devil\u2019s Canyon, Part 2 [due Mon] Wk 5 &#8211; Signature Assignment: Devil\u2019s Canyon, Part 2"},"content":{"rendered":"<p> Refer to Devil\u2019s Canyon, Part A in Wk 4. <\/p>\n<p> Using the potential risks for Devil\u2019s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team. In your matrix, you should: <\/p>\n<p> Describe\u00a0briefly each of the identified risks\/threats. <\/p>\n<p> Evaluate\u00a0the security controls that mitigate each of the risks\/threats identified. <\/p>\n<p> Provide\u00a0a rationale for how each of the controls identified mitigates the risk to an acceptable level. <\/p>\n<p> Research\u00a0and describe\u00a0the security technologies and security design that can be used to mitigate each of the identified information security risks. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Refer to Devil\u2019s Canyon, Part A in Wk 4. Using the potential risks for Devil\u2019s Canyon you identified in Wk 4, create a 3- to 4-page matrix to share with the team. In your matrix, you should: Describe\u00a0briefly each of the identified risks\/threats. Evaluate\u00a0the security controls that mitigate each of the risks\/threats identified. Provide\u00a0a rationale [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[36],"class_list":["post-27103","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-information-technology"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/27103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=27103"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/27103\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=27103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=27103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=27103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}