How those values were identified (if you did additional research or made assumptions, provide that information)

Topic: Cybersecurity

Conduct quantitative risk assessments using the FAIR methodology for the top 3 risks from the above question. Feel free to use the FAIR-U tool. Provide the following information for each risk:

All tables and continuums associated with the FAIR process

All individual values used for each risk analysis

How those values were identified (if you did additional research or made assumptions, provide that information)

Attach any exports of calculations from your FAIR analysis Top three risks Network segregation – understanding what should be segmented or reachable by third-parties or applications can help prevent bigger breaches.

Performing network vulnerability checks – It took 5 months for Home Depot to discover the breach.

They should be performing network scans or hire an outside company to scan the network for vulnerabilities. This creates a means to detect/patch breaches before they become serious.

Chip-and-Pin Cards – this adds an extra layer of protection as card numbers are encrypted and pins are only known by the owner The Fair-U website: https://app.fairu.net/login?redirect=%2Fanalysis