VERIFIED LATEST UPDATE
Categories of Threat
Physical
Outages & Failures
Hacking & abuse
Legal & contractual
Accidents & disaster/hazards
Categories of vulnerabilities
General
Information Specific
Controls of risk: Detective controls
Designed to identify information security incidents, such as intrusion detection systems
Controls of risk: Corrective controls
Designed to make appropriate change after having identified an incident to ensure that
it does not cause an impact. Example:anti-virus software; identified a viruswill block it
and perhaps remove it to prevent the virus from promulgating further