Understanding Risk Assessment Methodology

Consider the risk to "integrity of customer and financial data files on system" from "corruption of these files due to import of a worm/virus onto a system," as discussed in Problem 14.2 in your textbook. From the list shown in Table 15.3 in your textbook, select some suitable specific controls that could reduce this risk. Indicate which you believe would be most cost effective. Support your answers with references.

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS