The magnitude of the impact of a threat source after exploiting possible loopholes.
The magnitude of the impact a threat source before exploiting possible loopholes.
The likelihood of a given threat-source by exploiting a given vulnerability.
The collective judgment of the risk assessment team.
Increased; a fewer
Increased; the same
Less; a fewer
Increased; a greater.
Lack of user training for the new system.
Failing to perform user acceptance testing.
Lack of software documentation and run manuals.
Insufficient unit, module, and systems testing.
In the development phase of the systems-development project
In the feasibility phase of the systems-development project
In the requirements definition phase of the systems-development project.
In the design phase of the systems-development project
Detective integrity controls
Preventative integrity controls
Corrective integrity controls
Deterrent integrity controls.