This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Risk Mitigation

| See more in Information Technology

You'll learn terms related to risk mitigation.

TBaeten
By
Created Date 04.02.15
Last Updated 04.02.15
Viewed 34 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • An action potentially causing harm.
  • The person or element with the power to carry out a threat. (2 words)
  • The flaw or weakness allowing a threat agent to bypass security.
  • Likelihood of a threat agent exploiting a vulnerability.
  • A user's access level to an object such as a folder or file.
  • The process of assigning and revoking privileges to objects. (2 words)
  • Privilege ________ involves periodically reviewing a subject's privileges over an object.
  • Keeping track of changes/modifications in an organized, documented manner.
  • Change management ____ - group of individuals responsible for overseeing changes.
  • Outlines protections to ensure assets are exposed to minimal risk. (2 words)
  • A collection of requirements for a specific system or procedure - followed by everyone.
  • Collection of suggestions to be implemented.
  • A document outlining mandatory requirements to be met.