Please match the following information security risks to information security incidents one by one.[fill in the blank]*
physical security risk Enterprise server permissions are loosely set
Information Security Management Risk Infected Panda Burning Incense
Information Access Risk Fire destroyed equipment in computer room
application risk Talk to people about leaking company secrets
Laine
3 months agoLucina
2 months agoLinette
2 months agoMatthew
2 months agoStephaine
2 months agoJeffrey
3 months agoNana
3 months agoArthur
2 months agoArthur
3 months agoScarlet
4 months agoVirgina
4 months agoMelinda
4 months agoTarra
3 months agoLazaro
3 months agoXenia
4 months agoGabriele
4 months ago