ABSTRACT

There are nearly as many security risk assessment approaches as there are organizations that perform them. It is not the intent of this book to define the best or only approach for performing security risk assessments. In fact it seems clear that different approaches to performing a security risk assessment are required for different situations. Various security risk assessment approaches are discussed here for two reasons.