Which of the following components is NOT essential for effective information security risk management?
Identifying potential threats
Managing system upgrades
Developing mitigation strategies
Assessing vulnerabilities

Information Security Exercises are loading ...