Professional Documents
Culture Documents
CH 4 Review PT 2 Questions
CH 4 Review PT 2 Questions
They are specific avenues that threat agents can exploit to attack an
information asset.
They are chinks in the armor, a flaw or weakness in an information asset,
security procedure, design, or control that could be exploited accidentally or
on purpose to breach security.`
12. What five strategies for controlling risk are described in this chapter?
13. Describe the defense strategy for controlling risk. List and describe the
three common
methods.
14. Describe the transfer strategy for controlling risk. Describe how
outsourcing can be
used for this purpose.
15. Describe the mitigation strategy for controlling risk. What three planning
approaches