Why is threat identification so important in the process of risk management?

What will be an ideal response?


Any organization typically faces a wide variety of threats. If you assume that every threat can and will attack every information asset, then the project scope becomes too complex. To make the process less unwieldy, each step in the threat identification and vulnerability identification processes is managed separately and then coordinated at the end. At every step, the manager is called on to exercise good judgment and draw on experience to make the process function smoothly.

Computer Science & Information Technology

You might also like to view...

What is the function of the compiler?

A. Produces cross-platform code. B. Determines link errors. C. Issues commands directly to the processor. D. Reads source code and produces machine code.

Computer Science & Information Technology

A(n) ________ server is maintained by a hosting company and is connected to networks using the Internet

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following will sort an array of integers named rainfall?

``` function sortNum(A, B) { return (B – A); } ``` a. ``` function.rainfall.sort; ``` b. ``` rainfall.sort(); ``` c. ``` rainfall.sort(sortNum); ``` d. ``` sort(rainfall(sortNum(A,B))); ```

Computer Science & Information Technology

Which of the following qualifies as social engineering?

a. the illegal copying and distribution of a newly released theatrical film b. a brute force search for an employee's password c. befriending a company's cleaning crew to gain access to rooms and buildings d. using an anonymizer to conduct hard-to-track Internet searches

Computer Science & Information Technology