Risk Assessment

Having identified the assets and the factors that threaten them, the next step in formulating a network security implementation is to ascertain how likely the threats are in the environment in which the security is being implemented. Realize that although it can be important to protect against all types of attacks, security does not come cheap. Therefore, you must do a proper risk analysis to find out what the most significant sources of attack are and devote the most resources to protecting against them.

Risk assessment can be done in a variety of ways. However, two main factors affect the risk associated with a particular type of threat's materializing:

  • The likelihood that that particular attack will be launched against the ...

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.