List of Risks: Evaluation of Risk Effects Data CIA (Confidentiality, Integrity, and Availability) Computer Security and Accessibility Fire Risk Flooding Damages Risk of Stealing or Tampering With Sensitive Data Power Failure System Administration Backup Recovery Identify mitigation strategies to address the list of risks (8 – 12). Use the following format for explaining how you will address each risk: Accept and recognize the risk with your executive management and IT staff and managers. Adjust or reduce the risk. The adjustment can be done by updating requirements or risk listControl the risk by lowering the causes of it. Document everything and make sure it is correct. Continue to monitor and watch the risk effects and causes of the risks. Limit the recurrence of the risk and how to adjust your future plan of handling it.
#Evaluation #Risk #Effects #Data #CIA #Confidentiality #Integrity