Using the Project Template and the vulnerabilities/weaknesses identified in the 1st column, complete the Threats, Risks, and Controls/Countermeasures…

Using the Project Template and the vulnerabilities/weaknesses identified in the 1st column, complete the Threats, Risks, and Controls/Countermeasures that correspond to each weakness.

 More than one Threat and/or one Risk and/or one Control/Countermeasure may exist for each weakness.

 Do not include the Data Centers because they are owned by 3rd party vendors who maintain their own Risk Management plan.

weakness

1.Computer always left logged-in 

2.Employee uses a very simple password 

3.Client files left out on the desk overnight

4.Office left unlocked during lunch/breaks and overnight

Question: complete the Threats, Risks, and Controls/Countermeasures that correspond to each 4 weakness mentioned above

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!":

Get started