ABSTRACT

It is important to keep in perspective the purpose and intent of these first two chapters. The first chapter presented a model that can be used for information security risk assessment. A model in this context is used to define the basic parameters that organizations should consider and implement when designing and developing information security risk assessments.