Why is threat identification so important in the process of risk management?
What will be an ideal response?
Any organization typically faces a wide variety of threats. If you assume that every threat can and will attack every information asset, then the project scope becomes too complex. To make the process less unwieldy, each step in the threat identification and vulnerability identification processes is managed separately and then coordinated at the end. At every step, the manager is called on to exercise good judgment and draw on experience to make the process function smoothly.
You might also like to view...
Which of the following is the escape sequence that represents the newline character?
A. '\endl' B. '/t' C. '\n' D. '\t'
A single bit is all that is needed for a(n) ____ variable, since you can use a 0 to represent the value false and a 1 to represent the value true.
A. integer B. float C. boolean D. char