LIST OF FIGURES AND TABLES
Figure 0.1 Concepts and relationships
Figure 1.1 The information lifecycle
Figure 1.2 The overall risk management process
Figure 2.1 The Plan-Do-Check-Act cycle
Figure 4.1 A general view of the risk environment
Figure 4.2 Typical types of information asset
Figure 4.3 Generic sequence of situation management
Figure 4.4 A simple threat, vulnerability and impact
Figure 4.5 Multiple threats can exploit the same vulnerability
Figure 4.6 A single threat can exploit multiple vulnerabilities
Figure 4.7 A typical chain of consequence
Figure 4.9 Potential losses over time following a disruptive event
Figure 4.10 Typical impact assessment form
Get Information Risk Management: A practitioner’s guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.