Part TWO. Mitigating Risk

  • CHAPTER 5 Defining Risk Assessment Approaches 112

  • CHAPTER 6 Performing a Risk Assessment 138

  • CHAPTER 7 Identifying Assets and Activities to Be Protected 166

  • CHAPTER 8 Identifying and Analyzing Threats, Vulnerabilities, and Exploits 194

  • CHAPTER 9 Identifying and Analyzing Risk Mitigation Security Controls 222

  • CHAPTER 10 Planning Risk Mitigation Throughout the Organization 250

  • CHAPTER 11 Turning Your Risk Assessment into a Risk Mitigation Plan 278

Get Managing Risk in Information Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.