Which of the following BEST describes 'inherent risk' in information security?
-
A
Risk remaining after controls are applied
-
B
Risk that exists before any controls are implemented
-
C
Risk transferred to a third party via insurance
-
D
Risk associated with third-party vendors only