Respuesta :
Answer:
1 Agree on goals. Include all stakeholders in discussions of what should be achieved with the audit.
2 Define the scope of the audit.
3 Conduct the audit and identify threats.
4 Evaluate security and risks.
5 Determine the needed controls.
Explanation:
please mark me as brainlist
The data that organization has an abundance of is vulnerable to various cyber threats, and because even a minor misuse of data can result in significant client loss.
What is cyber threats?
Any circumstance or event that has the potential to harm organizational operations, assets, individuals, other organizations.
The Nation via a system through unauthorized access, destruction, disclosure, modification of information, and denial of service.
some kinds of cyber threats are Malware, Ransomware, Distributed denial of service attacks, Spam and Phishing, Corporate Account, Takeover and Automated Teller Machine.
Thus, the data that company has many cyber threats, due to misuse of the data can be faced by the person.
For further details about the cyber threats, click here:
https://brainly.com/question/15118614