Information Security & Risk Management

  1. Explain the basic concepts of and need for risk management.
  2. Explain methods of mitigating risk by managing threats vulnerabilities, and exploits.
  3. Identify compliancy laws, standards, best practices, and policies of risk management.
  4. Describe the components of an effective organizational risk management program.
  5. Describe techniques for identifying and analyzing relevant threats, vulnerabilities, and exploits.
  6. Describe the process of performing risk assessments.

Sample Solution