Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
192 ◾  Information Security Management Handbook
Once these criteria have been defined, the use of a simple scale of 1–5 for each item
will permit the calculation of the rating for the vulnerability. A typical scale for this type
of methodology would be low = 5–12, medium = 13–18, and high = 19–25. By using this
process for rating all the discovered vulnerabilities would then place them in the appropriate
context for the tested environment. is would result in better prioritization of resources for
remediation and also the credibility to any trending efforts.
Process Deliverables
One of the most advantageous tasks that an information security professional can do to properly
manage security testing is to establish a formalized process with a ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498