O'Reilly logo

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies by Steven Hernandez, Corey Schou

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

PART III

Risk Mitigation Process

Logically, the first strategy in managing risk is to try to prevent threats from exploiting existing vulnerabilities. Although we cannot reduce all risk, there is no doubt a well-implemented risk management strategy will reduce the probability of most of the risks occurring.

Part III discusses preventive controls that an organization should consider when developing protection strategies to minimize risks. It begins with Chapter 15, which highlights ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required