it security and risk management
- List three types of sensitive information involved with each situation.
- Identify three ways each information item could be misused or harmed.
- Answer the questions at the end of the table.
“Original Work Only”
No Plagiarism