Describe how the criticality of the affected assets must be taken into account when conducting a risk assessment for a vulnerability.

What will be an ideal response?


Criticality of the affected assets - Patches are produced by the same developers who introduced the problem in the first place; therefore, the patches must be tested to ensure that they do not have undesirable side effects when installed. Loss of access to a critical asset is equally disruptive to an organization, whether the cause is a malicious attack or a bad software patch.

Computer Science & Information Technology

You might also like to view...

What process will cause each file and folder on your computer's hard drive to occupy a single contiguous space on the volume?

A. performing a backup B. error-checking C. defragmenting D. disk compression

Computer Science & Information Technology

An ________ is a specific type of computer program that manages the other programs on computing devices

A) platform B) app C) operating system D) property

Computer Science & Information Technology

Which of the following is a word that has a special meaning in the programming language you are using?

A. named constant B. keyword C. variable D. hashtag

Computer Science & Information Technology

A/An _______ device driver has not been altered and cannot be overwritten by the installation process of another program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology