Summary

This chapter has covered foundational concepts in risk management. In a nutshell, risks are from threat sources to assets. When a threat event exploits a vulnerability, it results in a security violation, which could compromise the established CIA requirements of assets. Risks to assets may cause loss or damage, which is estimated through risk analysis methods. Security risks are managed through risk assessment, control implementation, risk monitoring, and review procedures.

In the next two chapters, we will cover asset protection and security that forms the basis for selection and implementation of technical and administrative controls.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.21.100.62