Problem 1: Explain the process of risk identification, risk assessment, and the development of risk control strategies in designing security for an information management system.
Problem 2: What are some of the risk control strategies a company can employ to minimize risk?
Problem 3: Describe how an organization uses each of these tools in developing a risk control policy that will reduce an organization's vulnerabilities.
Problem 4: Describe the type of control, how it used, how it is implemented, and what type of risk it will minimize.