Enterprise Cybersecurity by Scott E. Donaldson Stanley G. Siegel Chris K. Williams & Abdul Aslam

Enterprise Cybersecurity by Scott E. Donaldson Stanley G. Siegel Chris K. Williams & Abdul Aslam

Author:Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams & Abdul Aslam
Language: eng
Format: epub
Publisher: Apress, Berkeley, CA


Level 1 Assessment: Focus on Risk Mitigations

In the context of Figure 11-7, the highest-level enterprise cybersecurity assessment is a Risk Mitigations Assessment. This assessment starts by using the risk management methodology described in Chapters 2 and 4 to identify the most likely and most dangerous threats to the security scope. The assessment then considers those threats in terms of their attack sequence steps and security measures that log, detect, or prevent each step. If possible, assessors may also audit system logs to find if attacks have occurred in the past or are actively occurring at present. This assessment includes the following activities: 1.Identify threats to the security scope and their business impacts on confidentiality, integrity, and availability of enterprise IT systems and data



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.