Computer Science Homework Help
Eastern Illinois University Risk Management Discussion
I’m working on a cyber security discussion question and need an explanation and answer to help me learn.
1. Building on we learned last week, how do you believe security controls are chosen to address a risk or found vulnerability?
2. What happens to the risks/vulnerabilities that cannot be mitigated? Explain in detail.