The essay Common Security Techniques Information Technology
In addition, five cyber warfare scenarios can be considered: 1 State-sponsored cyber espionage to gather information to plan future cyber attacks, 2 A cyber attack aimed at laying the foundation for possible unrest and popular uprising, 3 Cyber attack aimed at disabling equipment and facilitating physical aggression, 4, Risk mitigation techniques in information security. Risk mitigation is a salient topic in risk management. With ever-changing technology, treats and breaches are inevitable, especially when there is vulnerability involved. There are various risk mitigation techniques. This article reviews several literatures and evaluates two basic approaches,