Please enable JavaScript to use CodeHS

Tennessee Cybersecurity I: C10H19.2.2

CodeHS Lessons

Preform a simulated risk assessment by using the common industry framework from ISO. Analyze and describe the risk mitigation techniques of acceptance, mitigation, avoidance, and transfer.

Standard
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
8.2 Assessing Risks
8.3 Risk Response
Standard
12.2 Assessing Risks
12.3 Risk Response
Standard
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
8.6 Checking for Vulnerabilities
8.7 Risky Business
Standard
13.2 Assessing Risks
13.3 Risk Response
Standard
15.2 Assessing Risks
Standard
13.2 Assessing Risks
13.3 Risk Response
Standard
6.6 Checking for Vulnerabilities
6.7 Risky Business
Standard
7.6 Checking for Vulnerabilities
7.7 Risky Business
7.8 Risk Response