Page 1 of 1

4. There are many security risk assessment methods described in this chapter and surveyed in Table 13.4. a. Identify a s

Posted: Sun Sep 05, 2021 6:33 am
by answerhappygod
4. There are many security risk assessment methods described in
this chapter and surveyed in Table 13.4.
a. Identify a security risk assessment method not covered
in  Table 13.4
b. Create a new row for the table to survey this method.
c. What benefits might this other approach have?
Ref: Douglas Landoll - The Security Risk Assessment Handbook_ A
Complete Guide for Performing Security Risk Assessments, Second
Edition (Chapter: 13, Ex: 4)
4 There Are Many Security Risk Assessment Methods Described In This Chapter And Surveyed In Table 13 4 A Identify A S 1
4 There Are Many Security Risk Assessment Methods Described In This Chapter And Surveyed In Table 13 4 A Identify A S 1 (55.95 KiB) Viewed 254 times
Application FAA projects (required) General-purpose method Table 13.4 Security Risk Assessment Methods Security Risk Assessment Approach Type Approach Phases Resources Required FAA SRM Open qualitative Asset identification • Program managers method • Asset criticality determination Facility managers • Criticality rating assignment • Integrated • Threat identification product team leaders • Existing countermeasure • Security representatives identification • Asset vulnerability rating assignment • Risk-level determination • Decision making • Risk-reduction determination • Cost-benefit analysis OCTAVE Open qualitative Profile threats and assets Internal, nonexperts method • Identify infrastructure vulnerabilities • Develop security strategy and plan Large corporations with ability to run their own tools (Continued)