Describe how the criticality of the affected assets must be taken into account when conducting a risk assessment for a vulnerability.
What will be an ideal response?
Criticality of the affected assets - Patches are produced by the same developers who introduced the problem in the first place; therefore, the patches must be tested to ensure that they do not have undesirable side effects when installed. Loss of access to a critical asset is equally disruptive to an organization, whether the cause is a malicious attack or a bad software patch.
You might also like to view...
What process will cause each file and folder on your computer's hard drive to occupy a single contiguous space on the volume?
A. performing a backup B. error-checking C. defragmenting D. disk compression
An ________ is a specific type of computer program that manages the other programs on computing devices
A) platform B) app C) operating system D) property
Which of the following is a word that has a special meaning in the programming language you are using?
A. named constant B. keyword C. variable D. hashtag
A/An _______ device driver has not been altered and cannot be overwritten by the installation process of another program.
Fill in the blank(s) with the appropriate word(s).