Question No. 1
1. What are information security vulnerabilities, and how do we identify vulnerabilities?
2. What are the four strategies for controlling risk?
Question No. 2
1. What is contingency planning? How is contingency planning different form routine management planning?
2. What are the components of contingency planning?
Please provide 3 References