Using the Project Template and the vulnerabilities/weaknesses identified in the 1st column, complete the Threats, Risks, and Controls/Countermeasures that correspond to each weakness.
? More than one Threat and/or one Risk and/or one Control/Countermeasure may exist for each weakness.
? Do not include the Data Centers because they are owned by 3rd party vendors who maintain their own Risk Management plan.
1.Computer always left logged-in
2.Employee uses a very simple password
3.Client files left out on the desk overnight
4.Office left unlocked during lunch/breaks and overnight
Question: complete the Threats, Risks, and Controls/Countermeasures that correspond to each 4 weakness mentioned above