Question: Use your cursor to match each example of a typical risk with the control that may be used to mitigate the risk in an

Use your cursor to match each example of a typical risk with the control that may be used to mitigate the risk in an IT environment. Introduction of unauthorized data or programs Physical and user controls Unauthorized access to data or programs Unauthorized changes Controls over access and backup copies Unauthorized changes Unauthorized access to data or programs Program and user controls Destruction of data Firewalls and password systems Introduction of unauthorized data or programs Destruction of infrastructure or Physical controls over terminals and testing of user programs and applications data
Step by Step Solution
3.50 Rating (160 Votes )
There are 3 Steps involved in it
Physical and user controls Unauthorized access to data or programs Destruction of infrastruct... View full answer
Get step-by-step solutions from verified subject matter experts
