O'Reilly logo

Metrics and Methods for Security Risk Management by Carl Young

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Measuring the vulnerability component of security risk
Physical laws simply cannot be ignored. Existence cannot be without them. — Spock
“Specter of the Gun,” Star Trek, Stardate 4383.5
5.1. Introduction
A rigorous examination of security risk entails analyzing each component of the fundamental expression of risk introduced in Chapter 1. In this chapter the vulnerability component of risk is investigated in detail. The good news here is that for some threats this component is amenable to a quantitative approach to analyzing risk. This is because some of these threats are influenced by physical processes and/or described by physical quantities that obey well-established natural laws.
Estimating and minimizing the vulnerability component ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required