BUISENESS MANAGEMENT
RISK MANAGEMENT
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -The terms “”threat” and “risk” can be used interchangeably; for example, a “threat assessment” is the same as a “risk assessment.”
Detailed explanation-2: -While threat assessments investigate issues as they occur or are being attempted, risk assessments cover a broader umbrella of possibilities to locate any potential problems and the degree of possible damage.
Detailed explanation-3: -A threat is a malicious or negative event that takes advantage of a vulnerability. Finally, the risk is the potential for loss and damage when the threat does occur.
Detailed explanation-4: -An STRA is the overall activity of assessing and reporting security risks for an information system to help make well informed risk-based decisions. An STRA also documents risk ratings and planned treatments.
Detailed explanation-5: -A threat exploits a vulnerability and can damage or destroy an asset. Vulnerability refers to a weakness in your hardware, software, or procedures. (In other words, it’s a way hackers could easily find their way into your system.) And risk refers to the potential for lost, damaged, or destroyed assets.