- CISSP in 21 Days(Second Edition)
- M. L. Srinivasan
- 98字
- 2021-07-14 11:04:28
Summary
This chapter has covered foundational concepts in risk management. In a nutshell, risks are from threat sources to assets. When a threat event exploits a vulnerability, it results in a security violation, which could compromise the established CIA requirements of assets. Risks to assets may cause loss or damage, which is estimated through risk analysis methods. Security risks are managed through risk assessment, control implementation, risk monitoring, and review procedures.
In the next two chapters, we will cover asset protection and security that forms the basis for selection and implementation of technical and administrative controls.
推薦閱讀
- CMDB分步構(gòu)建指南
- C++面向?qū)ο蟪绦蛟O(shè)計(jì)(微課版)
- Mastering Ember.js
- INSTANT CakePHP Starter
- Python自然語言處理(微課版)
- The Data Visualization Workshop
- Effective Python Penetration Testing
- C語言程序設(shè)計(jì)學(xué)習(xí)指導(dǎo)與習(xí)題解答
- 常用工具軟件立體化教程(微課版)
- Solr Cookbook(Third Edition)
- MINECRAFT編程:使用Python語言玩轉(zhuǎn)我的世界
- Node.js從入門到精通
- LabVIEW數(shù)據(jù)采集
- 征服C指針(第2版)
- 算法超簡單:趣味游戲帶你輕松入門與實(shí)踐