ABSTRACT

Each of the next three chapters is dedicated to the topic (or security risk assessment phase) of data gathering. e topic of data gathering is a large one and encompasses many activities and security controls. is large topic has been divided into three groups-administrative (Chapter 6), technical (Chapter 7), and physical (Chapter 8)—to facilitate the use of this book and to provide security risk assessment team members with target guidance on their area of review.