Discussion Post
• Clearly define threat, vulnerability, and exploit as they relate to information asset. Describe an example of an asset that is different than one already posted in the forum.
• Introduce the term cybercrime and why IT professionals should be concerned about it.
• Identify the threats/vulnerabilities presented in the video, Cybercrime: The Invisible Threat, from Films on Demand, and discuss whether the threats are controllable.
• What part of risk management addresses the threats such as those in the video? Can they be quantified? Should SETA come into play?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.