Chapter 7
Risk, Response, and Recovery |
Chris Trautwein
Contents
Introduction to Risk Management
Step 1. System Characterization
Step 3. Vulnerability Identification
Step 5. Likelihood Determination
Step 8. Control Recommendation
Get Official (ISC)2 Guide to the SSCP CBK, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.