- CISSP in 21 Days(Second Edition)
- M. L. Srinivasan
- 98字
- 2021-07-14 11:04:28
Summary
This chapter has covered foundational concepts in risk management. In a nutshell, risks are from threat sources to assets. When a threat event exploits a vulnerability, it results in a security violation, which could compromise the established CIA requirements of assets. Risks to assets may cause loss or damage, which is estimated through risk analysis methods. Security risks are managed through risk assessment, control implementation, risk monitoring, and review procedures.
In the next two chapters, we will cover asset protection and security that forms the basis for selection and implementation of technical and administrative controls.
推薦閱讀
- DB2 V9權(quán)威指南
- SQL Server 2016從入門到精通(視頻教學(xué)超值版)
- 小創(chuàng)客玩轉(zhuǎn)圖形化編程
- PyTorch自動(dòng)駕駛視覺感知算法實(shí)戰(zhàn)
- Full-Stack Vue.js 2 and Laravel 5
- JavaScript+Vue+React全程實(shí)例
- Yocto for Raspberry Pi
- 微信小程序項(xiàng)目開發(fā)實(shí)戰(zhàn)
- Mastering JavaScript High Performance
- Learning YARN
- GitHub入門與實(shí)踐
- Python全棧開發(fā):基礎(chǔ)入門
- HTML5游戲開發(fā)實(shí)戰(zhàn)
- Web程序設(shè)計(jì)與架構(gòu)
- 鋁合金陽極氧化與表面處理技術(shù)(第三版)