ABSTRACT

Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. Information Security Risk Analysis, Third Edition demonstrates how to id

chapter 2|10 pages

Risk Analysis (Project Impact Analysis)

chapter 3|14 pages

- Pre-Screening

chapter 4|18 pages

- Business Impact Analysis

chapter 5|12 pages

- Gap Analysis