Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Question
Book Icon
Chapter 5, Problem 15RQ
Program Plan Intro

Risk:

The probability of defining something that will go wrong as a source of any event or due to any series of sequences is referred as risk.

Five strategies of controlling risk:

  • Defense control strategy
  • Transfer control strategy
  • Mitigation control strategy
  • Acceptance control strategy
  • Termination control strategy

Blurred answer
Students have asked these similar questions
Which five risk-control strategies should be mentioned and quickly explained?
Would you please list and quickly describe the five risk-control strategies?
Have you experienced scope creep in your development of a Risk Management Plan (or other policy)? If so, how did you handle it? If not, what actions would you have taken to control scope creep? (Remember, if you have not personally experienced this situation, please research a company or individual who has dealt with scope creep and provide a brief overview of their situation. Be sure to copy/paste the link from which you retrieved the information)
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,