Using risk assessment to prevent cyber attacks


Description

Managing information security risks through a cycle of risk management activities that include (1) assessing risk and determining protection needs, (2) selecting and implementing cost-effective policies and controls to meet these needs, (3) promoting awareness of policies and controls and of the risks that prompted their adoption, and (4) implementing a program of routine tests and examinations for evaluating the effectiveness of policies and related controls.


© 2021-2024 AskTheFox.org by Vacilando.org
Official presentation at encyclopedia.uia.org