Presentation slides
Protection of Information Assets
Temple University
by David Lanter
by David Lanter
What are 3 types of risk mitigating controls? Which is the most important? Why is it the most important?
How you would apply the FIPS 199 security categorizations to decide if each of the information security risk mitigations (“safeguards”) described in the FGDC guidelines is needed?
Which information security objective(s) could be put at risk if the alternative safeguards recommended by the FGDC guidelines are applied? Explain how the objective(s) is put at risk by the mitigation(s).