官术网_书友最值得收藏!

Summary

This chapter has covered foundational concepts in risk management. In a nutshell, risks are from threat sources to assets. When a threat event exploits a vulnerability, it results in a security violation, which could compromise the established CIA requirements of assets. Risks to assets may cause loss or damage, which is estimated through risk analysis methods. Security risks are managed through risk assessment, control implementation, risk monitoring, and review procedures.

In the next two chapters, we will cover asset protection and security that forms the basis for selection and implementation of technical and administrative controls.

主站蜘蛛池模板: 隆回县| 若羌县| 盐津县| 绍兴县| 荃湾区| 南昌市| 上饶市| 吴川市| 景德镇市| 宁海县| 黔西县| 正安县| 花莲市| 太和县| 漠河县| 岱山县| 乐亭县| 丰原市| 红安县| 左贡县| 威远县| 夏邑县| 淳安县| 玉山县| 合山市| 郯城县| 凤冈县| 孟连| 富源县| 遂宁市| 方山县| 襄垣县| 隆回县| 肇庆市| 定州市| 沂南县| 台湾省| 桐梓县| 昌平区| 交口县| 临江市|