Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

d. Risks: Unauthorized Access to Sensitive Data Disruption of Online Services Damage to Reputation due to Security Incidents There are 4 techniques for controlling the

d. Risks: Unauthorized Access to Sensitive Data Disruption of Online Services Damage to Reputation due to Security Incidents There are 4 techniques for controlling the risk which is as follows: Acceptance: risk is acknowledged but no action is taken Transference: risk is transferred to a third party, but needs to pay a premium to the third party Avoidance: Identify the risk but do not act on the activity from where the risk may occur. Mitigation: Take a few mitigation techniques such as disaster recovery, business continuity, and others to reduce the risk. You need to state clearly what approach you want to choose for controlling the three identified risks above

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Essentials of strategic management

Authors: Charles w. l. hill, Gareth r. Jones

3rd Edition

1111525196, 978-1111525194

More Books

Students also viewed these General Management questions

Question

differentiate the function ( x + 1 ) / ( x ^ 3 + x - 6 )

Answered: 1 week ago