官术网_书友最值得收藏!

Summary

This chapter has covered foundational concepts in risk management. In a nutshell, risks are from threat sources to assets. When a threat event exploits a vulnerability, it results in a security violation, which could compromise the established CIA requirements of assets. Risks to assets may cause loss or damage, which is estimated through risk analysis methods. Security risks are managed through risk assessment, control implementation, risk monitoring, and review procedures.

In the next two chapters, we will cover asset protection and security that forms the basis for selection and implementation of technical and administrative controls.

主站蜘蛛池模板: 望都县| 雷山县| 同心县| 喀什市| 垣曲县| 贵德县| 叶城县| 白玉县| 湖南省| 台州市| 西充县| 海宁市| 德安县| 鹿泉市| 芜湖市| 修水县| 昂仁县| 江华| 缙云县| 宁蒗| 砚山县| 沙湾县| 通道| 正阳县| 昌邑市| 乡宁县| 依兰县| 福泉市| 巨鹿县| 丁青县| 萝北县| 靖安县| 稻城县| 松溪县| 海南省| 报价| 曲阜市| 云林县| 湟中县| 交口县| 吉首市|