Skip to Main Content
Risk Analysis and the Security Survey, 3rd Edition
book

Risk Analysis and the Security Survey, 3rd Edition

by Gene Tucker, James F. Broder
February 2006
Intermediate to advanced content levelIntermediate to advanced
392 pages
12h 13m
English
Butterworth-Heinemann
Content preview from Risk Analysis and the Security Survey, 3rd Edition
c. A demand without a threat?
d. What does the type of threat indicate about the demanders’ view
of the company?
e. What does the type of threat indicate about the group or person
making the threat?
6. How was the threat delivered?
a. Verbally, telephone (see Exhibit E.2, ransom demand telephone
checklist)
Exhibit E.2. Ransom Demand Telephone Checklist
Time of Call ________________________________________________________________________
Make every attempt to gain as much information from the caller as he will furnish, but do not give
the caller the impression you are reading questions from a checklist or are trying to keep him
on the line so the call
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition

EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition

IT Governance Privacy Team
Enterprise Risk Management

Enterprise Risk Management

John Fraser, Betty Simkins
Mastering Operational Risk, 2nd Edition

Mastering Operational Risk, 2nd Edition

Tony Blunden, John Thirlwell

Publisher Resources

ISBN: 9780750679220