Question: Please answer as soon as possible. Question: Computer security management involves identifying the assets that need to be protected, the threats and the methods to
Please answer as soon as possible.
Question: Computer security management involves identifying the assets that need to be protected, the threats and the methods to counter those threats.
a) Compare the four (4) approaches to mitigating and identifying risks to an organisations Information Technology (IT) infrastructure by providing the advantage of each approach. (3 marks) b) Describe the steps for the Plan-Do-Check-Act process model and draw the flowchart for this model (only illustrate the 4 main components of the model) (5 marks)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
