Question: Match each example of a typical risk with the control that may be used to mitigate the risk in an IT environment. Firewalls and password
Match each example of a typical risk with the control that may be used to mitigate the risk in an IT environment.
Firewalls and password systems
Physical and user controls
Controls over access and backup copies
Physical controls over terminals and testing of user programs and applications
Program and user controls
Match each of the options above to the items below.
Destruction of infrastructure or data
No answer
Unauthorized changes
No answer
Destruction of data
No answer
Introduction of unauthorized data or programs
No answer
Unauthorized access to data or programs
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
