TROUBLESHOOTING COMPUTER ISSUES
IDENTIFYING HARDWARE SOFTWARE NETWORK PROBLEMS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
When managerial decision is made, Security of information is always a major concern, thus IT should determine risks when data is exposed, the first step to achieve this is by (KLO 3.2, unit 28)
|
Identify threats and vulnerabilities
|
|
Categorize potential losses
|
|
Determine cost-effective safeguards
|
|
Analyse data and report it.
|
Explanation:
Detailed explanation-1: -It involves a number of steps, namely identification of assets; identification of threats; identification of existing security measures; identification of vulnerabilities; and identification of consequences.
Detailed explanation-2: -By identifying and analyzing potential vulnerabilities with an enterprise IT network, organizations can better prepare for cyber attacks and work to minimize the impact of a cyber incident, should it occur.
There is 1 question to complete.