Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
Expert Solution & Answer
Book Icon
Chapter 7, Problem 3RQ

Explanation of Solution

Risk treatment:

  • The process of selecting and implementing of measures to modify risk is called Risk Treatment.

Types of risk treatment strategies:

The five risk treatment strategies presented in this text are,

  • Defense
  • Transference
  • Mitigation
  • Acceptance
  • Termination

Defense:

It is the process to apply controls and safeguards that eliminate or decreases the remaining uncontrolled risk.

Transference:

It is the process of shifting the risks to other areas or to external entities...

Blurred answer
Students have asked these similar questions
What are the five risk-control methods you employ?
explain the five risk-control measures that you use?
List and briefly characterise the five risk-control methodologies.
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning