Available options for analysis of different levels of permissible risk exposure, with associated resource requirements. Selecting among risk avoidance, transfer, reduction, and acceptance. Insurance issues. Ranking risk probability vs. consequence, and appropriate actions. Data backup policies. Disaster recovery. Mitigating results of malware, viruses, ransomware, and other attacks.