The __________ risk treatment strategy attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards in an effort to change the likelihood of a successful attack on an information asset.
Fill in the blank(s) with the appropriate word(s).
defense
Computer Science & Information Technology
You might also like to view...
Circles have an initial speed of 0 and an initial direction of 0 degrees.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In the figure above, item 3 points to the border style.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology