You are the project manager of GHT project. You have implemented an automated tool to analyze and report on access control logs based on severity. This tool generates excessively large amounts of results.
You perform a risk assessment and decide to configure the monitoring tool to report only when the alerts are marked "critical". What you should do in order to fulfill that?
Which of the following will BEST quantify the risk associated with malicious users in an organization?
Which of the following is MOST helpful in determining the effectiveness of an organization's IT risk mitigation efforts?
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?