Chapter 3 Risk, Threat, and Vulnerability Assessments
Take calculated risks. That is quite different from being rash.
General George S. Patton, Jr.
In this chapter, readers will learn that the post implementation/program support phase occurs after the program has been implemented, and continues for the life of the program until phase-out. Management, users, and program developers need to continuously monitor the implementation phase to ensure that it measures up to the expectations and requirements developed in previous phases, and to enhance the program as needed to increase its useful life. This phase includes continuously monitoring, maintaining, and modifying the program to ensure that it performs as expected, and continues to meet the ...
Get Building A Global Information Assurance Program now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.