Need help with a question.
Risk mitigation strategies will provide the backdrop for cybersecurity execution processes. You have analyzed how vulnerability management programs protect organizations.
Create a 2- to 3-page Risk Analysis Report using Microsoft® Word detailing the following:
· Summarize incident response plans for 2 attack scenarios.
· Assess the ethical implications of these attacks.
· What are some of the key elements of a risk assessment?
· Are there mitigating controls that should be included to reduce the specific risk, and what might a mitigating control look like for a specific threat?
· Justify the use and placement of a firewall.
· Comment on security measures that can be deployed in a network to detect and stop potential threats, with a focus on IDS and IPS.
Cite any sources to support your assignment.
Format your citations according to APA guidelines.