官术网_书友最值得收藏!

Summary

This chapter has covered foundational concepts in risk management. In a nutshell, risks are from threat sources to assets. When a threat event exploits a vulnerability, it results in a security violation, which could compromise the established CIA requirements of assets. Risks to assets may cause loss or damage, which is estimated through risk analysis methods. Security risks are managed through risk assessment, control implementation, risk monitoring, and review procedures.

In the next two chapters, we will cover asset protection and security that forms the basis for selection and implementation of technical and administrative controls.

主站蜘蛛池模板: 布拖县| 惠安县| 台山市| 同仁县| 珲春市| 隆子县| 鸡西市| 鹤山市| 鄂州市| 丹巴县| 阿拉尔市| 林州市| 汉寿县| 中方县| 赤峰市| 庆城县| 东海县| 长乐市| 固安县| 汝州市| 吴江市| 昭通市| 舞钢市| 仁布县| 思南县| 伊金霍洛旗| 河北省| 常山县| 安宁市| 大港区| 平塘县| 遵义市| 安宁市| 灌云县| 黄浦区| 武宣县| 新昌县| 贺兰县| 青岛市| 正宁县| 镇安县|