ABSTRACT

Contents 23.1 Introduction .............................................................................................313 23.2 Risk Assessment versus Business Impact Analysis ..................................... 314 23.3 Risk Assessment ....................................................................................... 314

23.3.1 New Technology “Use Cases” ....................................................... 315 23.3.2 New Technology “Misuse Cases” .................................................. 315 23.3.4 The Ostrich ...................................................................................316 23.3.5 Vulnerabilities ...............................................................................316 23.3.6 Information Security Solutions ..................................................... 317 23.3.7 The People Risk ............................................................................ 318

23.4 Business Impact Analysis.......................................................................... 319 23.5 Summary .................................................................................................321