Answer the following questions.
Part 1
· Within the context of cybersecurity, how would you define risk management?
· What are 3 techniques/strategies used, when an organization embarks on risk management?
· For each of your 3 techniques/strategies,
§ Provide a brief description of each of your 3 techniques/strategies
Provide your source(s)!
Part 2
· Provide 3 examples of encryption through software
· Provide 3 examples of encryption through hardware
· Which would you say is more effective? encryption through software or encryption through hardware? Why?
Provide your source(s)!
0
Part 3
· Provide names of 3 countries that engage in cyber-warfare
· Provide 3 examples of state-sponsored cyber-attacks
Provide your source(s)!