September 2015
Intermediate to advanced
608 pages
21h 29m
English
After a company has identified its assets and considered the risks involved to that asset from a threat against a vulnerability, the company can then decide to implement countermeasures to reduce the risk of a successful attack. Common control methods used to implement countermeasures include the following:
Administrative: These consist of written policies, procedures, guidelines, and standards. An example would be a written acceptable use policy (AUP), agreed to by each user on the network. Another example is a change ...
Read now
Unlock full access