Chapter 8. Risk Aversion and Security Topologies
This chapter uses information that was presented in Chapter 4, "Putting It All Together: Threats and Security Equipment,” along with the results from surveys completed in both Chapter 5, "Policy, Personnel, and Equipment as Security Enablers,” and Chapter 7, "Engaging the Corporation: Management and Employees.” The surveys from both chapters can aid organizations in deriving a security topology model that is both relevant and viable.
This chapter covers the following topics:
• Risk aversion
• Risk-aversion quotient
• Security modeling
• Diminishing returns
Risk Aversion
Using explanations and examples, this section explores the following topics:
• The notion of risk aversion
• Determining risk ...
Get The Business Case For Network Security: Advocacy, Governance, And Roi now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.