Answered You can hire a professional tutor to get the answer.
Using the Project Template and the vulnerabilities/weaknesses identified in the 1st column, complete the Threats, Risks, and Controls/Countermeasures...
Using the Project Template and the vulnerabilities/weaknesses identified in the 1st column, complete the Threats, Risks, and Controls/Countermeasures that correspond to each weakness.
More than one Threat and/or one Risk and/or one Control/Countermeasure may exist for each weakness.
Do not include the Data Centers because they are owned by 3rd party vendors who maintain their own Risk Management plan.
weakness
1.Computer always left logged-in
2.Employee uses a very simple password
3.Client files left out on the desk overnight
4.Office left unlocked during lunch/breaks and overnight
Question: complete the Threats, Risks, and Controls/Countermeasures that correspond to each 4 weakness mentioned above