Once an organization has estimated the worth of various assets, what three questions must be asked to calculate the potential loss from the successful exploitation of a vulnerability?
What will be an ideal response?
What damage could occur, and what financial impact would it have?What would it cost to recover from the attack, in addition to the financial impact of damage?What is the single loss expectancy for each risk?
Computer Science & Information Technology
You might also like to view...
The Word 2013 feature that produces editable documents from PDF files is called PDF Reflow
Indicate whether the statement is true or false
Computer Science & Information Technology
The rectangle in a flowchart indicates:
a. A process. b. An input or output instruction. c. A decision. d. A module to be processed.
Computer Science & Information Technology