What Are We Doing Here?
Hay, Earl! “What is a Trojan horse virus?”
9.1 Risk analysis
Risk analysis is the process of determining where you most need to focus your time, efforts, and financial resources to develop a security implementation. This process will include the analysis of the threats, the impacts of those threats, and the corresponding risks. Once you have executed this process, significant business risks and weaknesses will be more evident, and this will help you develop counterstrategies.
The formula to determine risk is: Risk = Impact + Threats + Likelihood
As you perform your risk analysis, you will determine what is most ...
Get Internet Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.