Identifying Potential Risk, Response, and Recovery Name University For each malicious attack and threat identified in Assignment 1, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). As defined earlier, the threats to the companys information security network are the individuals willing, eager, and qualified to take advantage of security weaknesses and pursue new loopholes and weaknesses in the information systems to exploit. The malicious attacks are the various tools or programs used by the threats to compromise the companys networks and network devices. In order to cushion the organization from the devastating effects resulting from the potential threats and malicious attacks, it is crucial that the organization puts in place strategies aimed at dealing with the risk for example with reference to risk mitigation, management and avoidance (Hausman, 2011). Examples of such strategies are discussed below. The risk mitigation strategies are adopted with an aim of enabling the organizations to safeguard the availability, integrity, and confidentiality of company information systems from being compromised by malicious attacks or security threats. They include Review of the current security strategies - formulation of an effective security policies and controls calls for the application