O'Reilly logo

The Business Case For Network Security: Advocacy, Governance, And Roi by Warren Saxe, Catherine Paquet

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Risk Aversion and Security Topologies

This chapter uses information that was presented in Chapter 4, "Putting It All Together: Threats and Security Equipment,” along with the results from surveys completed in both Chapter 5, "Policy, Personnel, and Equipment as Security Enablers,” and Chapter 7, "Engaging the Corporation: Management and Employees.” The surveys from both chapters can aid organizations in deriving a security topology model that is both relevant and viable.

This chapter covers the following topics:

• Risk aversion

• Risk-aversion quotient

• Security modeling

• Diminishing returns

Risk Aversion

Using explanations and examples, this section explores the following topics:

• The notion of risk aversion

• Determining risk ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required