Crucial Technologies wants to ensure that they are protecting their assets from risk. They use security controls to lower the risk level down to a point that is within what the company can tolerate. What is the risk called that remains after the security controls are put in place?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |