CHAPTER SUMMARY
Risks, threats, and vulnerabilities and how they impact the seven domains of an IT infrastructure and its assets are an everyday menace. It is essential that organizations and individual users identify their own risks, threats, and vulnerabilities and implement a plan to mitigate them. You learned about the reasons for and processes of risk management. You also learned about risk assessment, including the difference between a quantitative and a qualitative risk assessment as well as common responses to risk and how they can help to develop a risk reduction strategy.
Many types of threats exist, including confidentiality threats, integrity threats, and availability threats. Another threat is the malicious attack. These attacks ...