This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Information Security Risk Terms

| See more in Information Technology

You'll become familiar with basic terms related to information security risks.

TBaeten
By
Created Date 03.26.15
Last Updated 03.26.15
Viewed 62 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • An object of value.
  • An action or event potentially causing harm.
  • This is the person or element with the power to execute a threat. (2 words)
  • This is a weakness or flaw a threat agent can exploit to bypass security.
  • The likelihood a threat agent will exploit a vulnerability.
  • One of the 3 options when dealing with risk: there is a chance of loss.
  • One of the 3 options when dealing with risk: takes precautions to reduce the risk.
  • One of the 3 options when dealing with risk: takes steps such as purchasing insurance.