- CISSP in 21 Days(Second Edition)
- M. L. Srinivasan
- 98字
- 2021-07-14 11:04:28
Summary
This chapter has covered foundational concepts in risk management. In a nutshell, risks are from threat sources to assets. When a threat event exploits a vulnerability, it results in a security violation, which could compromise the established CIA requirements of assets. Risks to assets may cause loss or damage, which is estimated through risk analysis methods. Security risks are managed through risk assessment, control implementation, risk monitoring, and review procedures.
In the next two chapters, we will cover asset protection and security that forms the basis for selection and implementation of technical and administrative controls.
推薦閱讀
- 深入理解Android(卷I)
- Bootstrap Site Blueprints Volume II
- Node.js 10實戰
- Mastering matplotlib
- UML+OOPC嵌入式C語言開發精講
- Mastering Google App Engine
- PySide GUI Application Development(Second Edition)
- UVM實戰
- 微服務從小白到專家:Spring Cloud和Kubernetes實戰
- 移動增值應用開發技術導論
- Cocos2d-x Game Development Blueprints
- RocketMQ實戰與原理解析
- AI自動化測試:技術原理、平臺搭建與工程實踐
- Java Web開發教程:基于Struts2+Hibernate+Spring
- Selenium Essentials