Skip to Main Content
Internet Security
book

Internet Security

by Tim Speed, Juanita Ellis
April 2003
Intermediate to advanced content levelIntermediate to advanced
398 pages
9h 43m
English
Digital Press
Content preview from Internet Security
9

What Are We Doing Here?

image

Hay, Earl! “What is a Trojan horse virus?”

9.1 Risk analysis

Risk analysis is the process of determining where you most need to focus your time, efforts, and financial resources to develop a security implementation. This process will include the analysis of the threats, the impacts of those threats, and the corresponding risks. Once you have executed this process, significant business risks and weaknesses will be more evident, and this will help you develop counterstrategies.

The formula to determine risk is: Risk = Impact + Threats + Likelihood

As you perform your risk analysis, you will determine what is most ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Express Learning: Cryptography and Network Security

Express Learning: Cryptography and Network Security

ITL Education Solutions Limited
Network Security

Network Security

Jan L. Harrington
Internet of Things

Internet of Things

Simone Cirani, Gianluigi Ferrari, Marco Picone, Luca Veltri
Internet of Things

Internet of Things

Mayur Ramgir

Publisher Resources

ISBN: 9781555582982