Security+: Risk Mitigation Strategies

Introduction Once a thorough risk analysis has been performed, various solutions can be implemented, including avoidance, transference, acceptance, mitigation, and deterrence. The following sections…

Go on to the site to read the full article

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Fakhar Imam. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/iLmKykThaH4/