Discuss with examples, the three criteria to examine whether existing security is enough
The security sufficiency can be tested by carrying out a comprehensive security risk test. The Information and technology manager can try the networking staff. Secondly, a control infrastructure check can be conducted in the process of checking the security strength. An organization can check on the cost of the security software used. For instance, the best performance security software is expensive to buy and maintain.
Reference.
Schmittling, R., & Munns, A. (2010). Performing a security risk assessment. Isaca Journal, 1, 18.
Comments
Leave a comment