4. There are many security risk assessment methods described in this chapter and surveyed in Table 13.4. a. Identify a s

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899559
Joined: Mon Aug 02, 2021 8:13 am

4. There are many security risk assessment methods described in this chapter and surveyed in Table 13.4. a. Identify a s

Post by answerhappygod »

4. There are many security risk assessment methods described in
this chapter and surveyed in Table 13.4.
a. Identify a security risk assessment method not covered
in  Table 13.4
b. Create a new row for the table to survey this method.
c. What benefits might this other approach have?
Ref: Douglas Landoll - The Security Risk Assessment Handbook_ A
Complete Guide for Performing Security Risk Assessments, Second
Edition (Chapter: 13, Ex: 4)
4 There Are Many Security Risk Assessment Methods Described In This Chapter And Surveyed In Table 13 4 A Identify A S 1
4 There Are Many Security Risk Assessment Methods Described In This Chapter And Surveyed In Table 13 4 A Identify A S 1 (55.95 KiB) Viewed 174 times
Application FAA projects (required) General-purpose method Table 13.4 Security Risk Assessment Methods Security Risk Assessment Approach Type Approach Phases Resources Required FAA SRM Open qualitative Asset identification • Program managers method • Asset criticality determination Facility managers • Criticality rating assignment • Integrated • Threat identification product team leaders • Existing countermeasure • Security representatives identification • Asset vulnerability rating assignment • Risk-level determination • Decision making • Risk-reduction determination • Cost-benefit analysis OCTAVE Open qualitative Profile threats and assets Internal, nonexperts method • Identify infrastructure vulnerabilities • Develop security strategy and plan Large corporations with ability to run their own tools (Continued)
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply