Explain two practical guidelines to follow in risk treatment strategy selection.
What will be an ideal response?
- When a vulnerability (flaw or weakness) exists: Implement security controls to reduce the likelihood of a vulnerability being exploited.- When a vulnerability can be exploited: Apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack.- When the attacker's potential gain is greater than the costs of attack: Apply protections to increase the attacker's cost or reduce the attacker's gain by using technical or managerial controls.- When the potential loss is substantial: Apply design principles, architectural designs, and technical and non-technical protections to limit the extent of the attack, thereby reducing the potential for loss.
You might also like to view...
The read-only status is ignored if a document is opened in a version of Word earlier than 2007
Indicate whether the statement is true or false
What is the only image file format generated by the CSS Properties panel (or the
export to CSS command)? What will be an ideal response?