

References
1.
Bradley, T.
(October 17, 2016).
Critical Vulnerability in Apple Mac OS
.
Retrieved from
-

mac-os-x-2487643
2.
National Institute of Standards and Technology (NIST).
(2010).
Guide for applying the risk
management framework to federal information systems.
NIST Special Publication 800-37 Revision 1.
Retrieved from
-
rev1/sp800-37-rev1-final.pdf
3.
National Institute of Standards and Technology (NIST).
(2012).
Guide for Conducting Risk
Assessments.
NIST Special Publication 800-30 Revision 1.
Retrieved

from
tion800-30r1.pdf
4.
National Institute of Standards and Technology (NIST).
(2014).
Assessing security and
privacy controls in federal information systems and
organizations
.
NIST Special Publication 800-53A Revision 4.
Retrieved
from
SpecialPublications/NIST.SP.800-53Ar4.pdf
5.
National Institute of Standards and Technology (NIST).
(2006).
Electronic Authentication

Guideline.
NIST Special Publication 800-63 Revision 1.0.2.
Retrieved
from
tion800-63ver1.0.2.pdf
6. Rouse, M.
(2017).
Definition: buffer overflow
.
Retrieved from
.
techtarget.com/definition/buffer-overflow
rar_graded.docx

Running head:
Risk Assessment Repot (RAR)
1
Risk Assessment Report (RAR)
8
Risk Assessment Report (RAR)
CYB 610:
Cyberspace and Cybersecurity Foundations
Me
University of Maryland University College


