The __________ risk treatment strategy attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards in an effort to change the likelihood of a successful attack on an information asset.                              

Fill in the blank(s) with the appropriate word(s).

defense

Computer Science & Information Technology

You might also like to view...

Circles have an initial speed of 0 and an initial direction of 0 degrees.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In the figure above, item 3 points to the border style.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology