4. There are many security risk assessment methods described in
this chapter and surveyed in Table 13.4.
a. Identify a security risk assessment method not covered
in Table 13.4
b. Create a new row for the table to survey this method.
c. What benefits might this other approach have?
Ref: Douglas Landoll - The Security Risk Assessment Handbook_ A
Complete Guide for Performing Security Risk Assessments, Second
Edition (Chapter: 13, Ex: 4)
Application FAA projects (required) General-purpose method Table 13.4 Security Risk Assessment Methods Security Risk Assessment Approach Type Approach Phases Resources Required FAA SRM Open qualitative Asset identification • Program managers method • Asset criticality determination Facility managers • Criticality rating assignment • Integrated • Threat identification product team leaders • Existing countermeasure • Security representatives identification • Asset vulnerability rating assignment • Risk-level determination • Decision making • Risk-reduction determination • Cost-benefit analysis OCTAVE Open qualitative Profile threats and assets Internal, nonexperts method • Identify infrastructure vulnerabilities • Develop security strategy and plan Large corporations with ability to run their own tools (Continued)
4. There are many security risk assessment methods described in this chapter and surveyed in Table 13.4. a. Identify a s
-
- Site Admin
- Posts: 899589
- Joined: Mon Aug 02, 2021 8:13 am