Answer Below 2 Questions. No APA Required essay
1. Sort the following threats from most frequently encountered to least frequently encountered. Support your answer with a URL evidence in a table format (sample attached). - Compromises to intellectual property - Deviations in quality of service from service providers - Espionage or trespass - Forces of nature - Human error or failure - Information extortion - Sabotage or vandalism - Software Attacks - Technical hardware failures or errors - Technical software failures or errors - Technological obsolescence - Theft 2. Search for and explain at least one alternative to following formula to rank risks and include the source URL Risk = Likelihood of threat event (attack) occurrence X impact (or consequence) -research paper writing service