O'Reilly logo

CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide by Dawn Dunkerley, Bobby E. Rogers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 2

Threats and Vulnerabilities in the Enterprise

In this chapter, you will:

•  Learn how to identify potential threats and vulnerabilities

•  Understand the different business initiatives and processes that create risk

•  Analyze how threats and vulnerabilities factor into different aspects of enterprise risk, including areas such as data management, third-party relationships, the systems development life cycle, project management, business continuity and disaster recovery, IT operations management, and implementation of new technologies

This chapter covers the second part of the first Certified in Risk and Information Systems Control (CRISC) domain and focuses on threats and vulnerabilities associated with different aspects of the enterprise. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required