Answered>Order 2922

Using the Project Template and the vulnerabilities/weaknesses identified in the 1st column, complete the Threats, Risks, and Controls/Countermeasures that correspond to each weakness.

? More than one Threat and/or one Risk and/or one Control/Countermeasure may exist for each weakness.

? Do not include the Data Centers because they are owned by 3rd party vendors who maintain their own Risk Management plan.

weakness

1.Computer always left logged-in 

2.Employee uses a very simple password 

3.Client files left out on the desk overnight

4.Office left unlocked during lunch/breaks and overnight

Question: complete the Threats, Risks, and Controls/Countermeasures that correspond to each 4 weakness mentioned above

 
"Not answered?"
Get the Answer