Evaluation of Risk Effects Data CIA (Confidentiality, Integrity, and Availability)
Computer Security and Accessibility
Fire Risk
Flooding Damages
Risk of Stealing or Tampering With Sensitive Data
Power Failure
System Administration
Backup Recovery
Identify mitigation strategies to address the list of risks (8 – 12). Use the following format for explaining how you will address each risk: Accept and recognize the risk with your executive management and IT staff and managers. Adjust or reduce the risk. The adjustment can be done by updating requirements or risk listControl the risk by lowering the causes of it. Document everything and make sure it is correct. Continue to monitor and watch the risk effects and causes of the risks. Limit the recurrence of the risk and how to adjust your future plan of handling it.

Sample Solution

This question has been answered.

Get Answer