Chapter 2. Implementing Security Policies Using a Lifecycle Approach
The chapter covers the following topics:
• Quantitative Risk Analysis Formula
• Quantitative Risk Analysis Example
• Standards, Guidelines, and Procedures
• Security Policy Audience Responsibilities
Secure Network Lifecycle Management
• Assessing and Monitoring the Network Security Posture
• Testing the Security Architecture
• Computer Crime Investigation
• Collection of Evidence and Forensics
• Law Enforcement and Liability
• Ethics
Disaster-Recovery and Business-Continuity Planning
Risk Analysis
Risk needs to be framed, assessed, monitored, ...
Get CCNA Security (640-554) Portable Command Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.