Once an organization has estimated the worth of various assets, what three questions must be asked to calculate the potential loss from the successful exploitation of a vulnerability?

What will be an ideal response?

What damage could occur, and what financial impact would it have?What would it cost to recover from the attack, in addition to the financial impact of damage?What is the single loss expectancy for each risk?

Computer Science & Information Technology

You might also like to view...

The Word 2013 feature that produces editable documents from PDF files is called PDF Reflow

Indicate whether the statement is true or false

Computer Science & Information Technology

The rectangle in a flowchart indicates:

a. A process. b. An input or output instruction. c. A decision. d. A module to be processed.

Computer Science & Information Technology