ABSTRACT

This chapter describes the third component of an effective information security/IA program — implementing threat control measures. Outputs from the previous component, performing vulnerability and threat analyses, are used to prioritize the implementation of threat control measures. The following activities are performed during the implementation of threat control measures:

The extent of protection needed is determined.