Question: Please answer as soon as possible. Question: Computer security management involves identifying the assets that need to be protected, the threats and the methods to

Please answer as soon as possible.

Question: Computer security management involves identifying the assets that need to be protected, the threats and the methods to counter those threats.

a) Compare the four (4) approaches to mitigating and identifying risks to an organisations Information Technology (IT) infrastructure by providing the advantage of each approach. (3 marks) b) Describe the steps for the Plan-Do-Check-Act process model and draw the flowchart for this model (only illustrate the 4 main components of the model) (5 marks)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!