Bundle: Principles Of Information Security, Loose-leaf Version, 6th + Lms Integrated Mindtap Computer Security, 1 Term (6 Months) Printed Access Card
Bundle: Principles Of Information Security, Loose-leaf Version, 6th + Lms Integrated Mindtap Computer Security, 1 Term (6 Months) Printed Access Card
6th Edition
ISBN: 9781337750738
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Question
Book Icon
Chapter 5, Problem 14RQ
Program Plan Intro

Risk:

The probability of defining something that will go wrong as a source of any event or due to any series of sequences is referred as risk.

Five strategies of controlling risk:

  • Defense control strategy
  • Transfer control strategy
  • Mitigation control strategy
  • Acceptance control strategy
  • Termination control strategy

Blurred answer
Students have asked these similar questions
Describe the transference strategy for controlling risk. Describe how outsourcing can be used for this purpose.
Describe how outsourcing may help shift risk.
The purpose of doing a risk analysis.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning