Answer the following questions.
Part 1
Within the context of cybersecurity, how would you define risk management?
What are 3 techniques/strategies used, when an organization embarks on risk management?
For each of your 3 techniques/strategies,
Provide a brief description of each of your 3 techniques/strategies
Provide your source(s)!
Part 2
Provide 3 examples of encryption through software
Provide 3 examples of encryption through hardware
Which would you say is more effective? encryption through software or encryption through hardware? Why?
Provide your source(s)!
0
Part 3
Provide names of 3 countries that engage in cyber-warfare
Provide 3 examples of state-sponsored cyber-attacks
Provide your source(s)!