ABSTRACT

First, it is important to understand the di¤erent approaches that have been developed and are currently in use to perform a security risk assessment. ose performing these assessments should always be looking for ways to improve the process through the adoption of new techniques or the modi‹cation of current ones. To allow for the process of continuous improvement, those de‹ning and performing security risk assessments must have an understanding of the other approaches currently being used.