151k views
1 vote
What is the step involved in risk management after vulnerabilities of an organization have been examined?

A) determination of the source of threats
B) assessment of threats
C) evaluation of controls that fill in security gaps
D) finalization of broadly defined goals

User AgentKnopf
by
8.4k points

1 Answer

3 votes

Final answer:

After examining vulnerabilities, an organization proceeds with the(B). assessment of threats. This involves analyzing and prioritizing potential threats, followed by evaluating and ensuring that controls adequately cover security gaps.

Step-by-step explanation:

Once an organization has examined its vulnerabilities, the next step in risk management is the assessment of threats. This involves analyzing the various threats that could exploit the vulnerabilities identified. It includes determining the likelihood of each threat, its potential impact, and how it can affect the organization. After assessing the threats, the organization can prioritize them and create strategies to mitigate the risks.

This process goes hand in hand with the evaluation of controls that fill in security gaps. Proper evaluation will help to ensure that the organization's security measures are effective and cover all identified vulnerabilities appropriately. To provide an example, if vulnerabilities are found in an organization's cyber security, the next step would be to assess threats such as hacking or phishing attacks and evaluate controls like firewalls and two-factor authentication.

User Muhamed AlGhzawi
by
8.7k points