Part TWO. Mitigating Risk
CHAPTER 5 Defining Risk Assessment Approaches 112
CHAPTER 6 Performing a Risk Assessment 138
CHAPTER 7 Identifying Assets and Activities to Be Protected 166
CHAPTER 8 Identifying and Analyzing Threats, Vulnerabilities, and Exploits 194
CHAPTER 9 Identifying and Analyzing Risk Mitigation Security Controls 222
CHAPTER 10 Planning Risk Mitigation Throughout the Organization 250
CHAPTER 11 Turning Your Risk Assessment into a Risk Mitigation Plan 278
Get Managing Risk in Information Systems now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.