What part of risk management addresses the threats such as those in the video
In at least 450 words, discuss the following in your main post.
Clearly define threat, vulnerability, and exploit as they relate to information asset. Describe an example of an asset that is different than one already posted in the forum.
Introduce the term cybercrime and why IT professionals should be concerned about it.
Identify the threats/vulnerabilities presented in the video, Cybercrime: The Invisible Threat, from Films on Demand, and discuss whether the threats are controllable.
What part of risk management addresses the threats such as those in the video? Can they be quantified? Should SETA come into play?
NOTE: Sites the professor mentioned about
NIST SP 800-30 Rev. 1
NIST SP 800-39
Answer preview to what part of risk management addresses the threats such as those in the video
APA
1192 Words