10 Security Risk Analysis Worked Examples
In order to demonstrate the concepts of threat assessment, vulnerability assessment, impact assessment, and security risk calculation, this chapter includes worked examples demonstrating the concepts in security risk analysis to illustrate the techniques presented in this chapter. These worked examples provide guidance on how to perform this step of the security risk assessment process no matter which method the team chooses to adopt. As such these worked examples will be used throughout this chapter of security risk analysis.
The worked examples will be demonstrated through an example security risk assessment method using both the qualitative approach and a quantitative approach. The assessment team ...
Get The Security Risk Assessment Handbook, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.