This chapter uses information that was presented in Chapter 4, "Putting It All Together: Threats and Security Equipment,” along with the results from surveys completed in both Chapter 5, "Policy, Personnel, and Equipment as Security Enablers,” and Chapter 7, "Engaging the Corporation: Management and Employees.” The surveys from both chapters can aid organizations in deriving a security topology model that is both relevant and viable.
This chapter covers the following topics:
• Risk aversion
• Risk-aversion quotient
• Security modeling
• Diminishing returns
Using explanations and examples, this section explores the following topics:
• The notion of risk aversion
• Determining risk ...