13
results found in
4 ms
Page 1
of 2
Risk-case list of controls to mitigate risks
Resulting in more consistent effects and easier evaluation
Full description
Resulting in more consistent effects and easier evaluation
Full description
Risk-case mandatory strategies implemented incompletely
Resulting in lower level of information security
Full description
Resulting in lower level of information security
Full description
Risk-case poor information architecture
Resulting in higher cost of data processing
Full description
Resulting in higher cost of data processing
Full description
Risk-case shortcomings in the security management
Resulting in breach of information availability, confidentiality, integrity
Full description
Resulting in breach of information availability, confidentiality, integrity
Full description
Risk-case insufficient business continuity arrangments
Resulting in breakdown of the information system
Full description
Resulting in breakdown of the information system
Full description
Risk-case poor automation of personal data processing
Resulting in insufficient compliance with the law
Full description
Resulting in insufficient compliance with the law
Full description