R
Remediation time frames, security vulnerabilities, 197, 197t
Repeatability, 19–20
Replacement, 68–70
costs, 68
cyber criminal/malicious/confidentiality risk analysis example, 144, 144t
nonprivileged insider/malicious risk analysis example, 168t
privileged insider/confidentiality risk analysis example, 154–155, 155t, 160t
privileged insider/malicious/confidentiality risk analysis example, 132–133, 133t
secondary, 69
sophisticated attacker/availability risk analysis example, 181–182
Reputation, 72–73
basic attacker/availability risk analysis example, 190t
damage, CA loss and, 237–238
privileged insider/confidentiality risk analysis example, 156–164, 161t
privileged insider/malicious/confidentiality risk analysis example, 134–142 ...

Get Measuring and Managing Information Risk now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.