This is Information Assurance Security, may someone help me to understand this. May you give me an explanation and example for me to understand. Thank you, I would apprecite your response. - How important is it to evaluate risks? Is it even really that important? - Would you agree that threats are always there? Is it possible to completely mitigate or eradicate threats? - What is the relation of controls to vulnerabilities?
This is Information Assurance Security, may someone help me to understand this. May you give me an explanation and example for me to understand. Thank you, I would apprecite your response.
- How important is it to evaluate risks? Is it even really that important?
- Would you agree that threats are always there? Is it possible to completely mitigate or eradicate threats?
- What is the relation of controls to vulnerabilities?
- Is it safe for companies to fully invest in just physical controls to avoid threats?
-What do you think should be done to lessen the chances of facing threats?
-If your online personal information found in your social media accounts is at stake, what do you think are the risks and vulnerabilities of it? What controls will you employ to avoid those threats?
Step by step
Solved in 3 steps with 1 images