This website uses cookies to ensure you get the best experience on our website.
Privacy Policy
OK
Wisc-Online Arcade Logo
Toggle navigation
Learn
Games
Play Games
Build Games
Courses
Image Library
Search
User Profile
Sign Up
Sign In
Sign In
Sign Up
Risk Mitigation
|
See more in
Information Technology
You'll learn terms related to risk mitigation.
By
Baeten
Created Date 04.02.15
Last Updated 04.02.15
Viewed 34 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
Download text-based alternate version
Tweet
Vote Up
Vote Down
151
Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!
But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.
Download the Chakalaka mobile app here:
You need to be logged in to use this feature.
Log In
or
Register
Topics of this game:
An action potentially causing harm.
The person or element with the power to carry out a threat. (2 words)
The flaw or weakness allowing a threat agent to bypass security.
Likelihood of a threat agent exploiting a vulnerability.
A user's access level to an object such as a folder or file.
The process of assigning and revoking privileges to objects. (2 words)
Privilege ________ involves periodically reviewing a subject's privileges over an object.
Keeping track of changes/modifications in an organized, documented manner.
Change management ____ - group of individuals responsible for overseeing changes.
Outlines protections to ensure assets are exposed to minimal risk. (2 words)
A collection of requirements for a specific system or procedure - followed by everyone.
Collection of suggestions to be implemented.
A document outlining mandatory requirements to be met.
Questions
Feedback
Ask a Question
New Question
Cancel
|
Save
Start a new Discussion
New Discussion
Cancel
|
Save