Course name: Information security and risk management
We are concentrating our readings in Chapter 8 of our text book this week. Please answer the following questions:
1. Why is a threat assessment so important to an organization?
2. What are some key steps an assessor should take before performing a vulnerability assessment? In other words, what should be reviewed first, and why.
3. Explain your understanding of a continuous monitoring program; why it should be implemented; and how would it help the overall risk management program.
4. Explain why a penetration assessment is valuable. What benefits can be derived from performing these assessments periodically? Why?
Please make sure you include sources your reviewed for this assignment.