Answered You can hire a professional tutor to get the answer.

QUESTION

Using the Project Template and the vulnerabilities/weaknesses identified in the 1st column, complete the Threats, Risks, and Controls/Countermeasures...

Using the Project Template and the vulnerabilities/weaknesses identified in the 1st column, complete the Threats, Risks, and Controls/Countermeasures that correspond to each weakness.

 More than one Threat and/or one Risk and/or one Control/Countermeasure may exist for each weakness.

 Do not include the Data Centers because they are owned by 3rd party vendors who maintain their own Risk Management plan.

weakness

1.Computer always left logged-in 

2.Employee uses a very simple password 

3.Client files left out on the desk overnight

4.Office left unlocked during lunch/breaks and overnight

Question: complete the Threats, Risks, and Controls/Countermeasures that correspond to each 4 weakness mentioned above

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question