Accessing and Managing Security Risks
You can use the following simple process outline for accessing and managing security risks:
- Set the scope.
- Identify assets and determines their value.
- Predict threats and vulnerabilities to assets.
- Document the security risks.
- Determine a risk management strategy.
- Monitor assets.
- Track changes to assets.
Adopted from the book Assessing Network Security by Ben Smith, David LeBlanc, Kevin Lam.
0 Comments:
Post a Comment
<< Home