Assignment Help:Central Repository and Threat Modeling
Central Repository and Threat Modeling
- From the e-Activity, provide three examples of unintentional security threats and three examples of intentional security threats. Determine which of these examples puts an organization at a higher risk and explain why.
- Propose three advantages and three disadvantages of using a central repository. Determine which advantages are the most important to an organization and which disadvantage is the most limiting to an organization.
Please follow and like us: