CHAPTER 2

Threats and Vulnerabilities in the Enterprise

In this chapter, you will:

•  Learn how to identify potential threats and vulnerabilities

•  Understand the different business initiatives and processes that create risk

•  Analyze how threats and vulnerabilities factor into different aspects of enterprise risk, including areas such as data management, third-party relationships, the systems development life cycle, project management, business continuity and disaster recovery, IT operations management, and implementation of new technologies

This chapter covers the second part of the first Certified in Risk and Information Systems Control (CRISC) domain and focuses on threats and vulnerabilities associated with different aspects of the enterprise. ...

Get CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.