0% found this document useful (0 votes)
29 views1 page

Group 2 - Bsit 4a - 4b - N

The document outlines a cyber security risk assessment conducted by Group 2, identifying various assets, sources of threats, and types of threats. Key threats include spam mail, Trojan horses, phishing, and malware, affecting both personal and organizational security. The assessment highlights the importance of recognizing malicious insiders and third-party risks in the cyber security landscape.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views1 page

Group 2 - Bsit 4a - 4b - N

The document outlines a cyber security risk assessment conducted by Group 2, identifying various assets, sources of threats, and types of threats. Key threats include spam mail, Trojan horses, phishing, and malware, affecting both personal and organizational security. The assessment highlights the importance of recognizing malicious insiders and third-party risks in the cyber security landscape.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CYBER SECURITY RISK ASSESSMENT

GROUP 2
(BSIT- 4A & 4B - NIGHT)
ASSET SOURCE OF THREATS KIND OF THREATS
Spam Mail Spamming
Personal Roque Security Trojan Horse
Social Media Security Phishing
Malicious Insiders Intentional Threat
Organization Sabotage Third Parties
Whaling Phishing
Physical Tailgating Man in the middle attack
Virtual Viruses Malware Threat

Members:
Aguipo, Shenlie A.
Bayo, Gomersindo Jr.
Briguez, Lea Mitch
Capuyan, Ma. Jessie Jean S.
Cobarde, Ian
Cueva, Robby
Go-od, Banisa May
Joromo, Jaynah Hayacinth
Mangas, Jeabebs C.
Mata, Regla Elyn
Manulat, John Lovemeir
Olivar, Kyle Monique
Pasaje. Nenia
Pugoy, Angelica
Razon, Chona Mae
Tariao, John Rey

You might also like