Please match the following information security risks to information security incidents one by one.[fill in the blank]* physical security risk Enterprise server permissions are loosely set Information Security Management Risk Infected Panda Burning Incense Information Access Risk Fire destroyed equipment…