Skip to Main Content
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
book

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

by O. Sami Saydjari
August 2018
Intermediate to advanced content levelIntermediate to advanced
512 pages
17h 18m
English
McGraw-Hill
Content preview from Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

CHAPTER

18   Risk Mitigation and Optimization

Overview

•   18.1 Develop Candidate Mitigation Packages

•   18.2 Assess Cost of Mitigation Packages

•   18.2.1 Direct Cost

•   18.2.2 Mission Impact

•   18.3 Re-estimate Leaf Node Probabilities and Compute Root Node Probability

•   18.4 Optimize at Various Practical Budget Levels

•   18.4.1 Knapsack Algorithm

•   18.4.2 Sensitivity Analysis

•   18.5 Decide Investment

•   18.6 Execute

Learning Objectives

•   List and describe the risk mitigation elements in the risk assessment process and discuss how they relate to risk assessment analysis elements.

•   Explain how risk mitigation packages are formulated and how they are used in the process.

•   Define, compare, and contrast attack direct cost and ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

Nancy R. Mead, Carol C. Woody
Security Chaos Engineering

Security Chaos Engineering

Kelly Shortridge, Aaron Rinehart

Publisher Resources

ISBN: 9781260118186