Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
206 Vulnerability ManageMent
6.7.2 Assess Security Controls
A complete understanding of policies, procedures, and standards will
also paint a clearer picture of the risk environment. Policies may not
reflect the changing needs of the organization or, conversely, opera-
tions may not adhere to policy or standards. In the risk assessment
process, it is necessary to quantify the value of the security controls
employed between potential threats and a target as shown in Table 6.1.
e threats come from two sources: internal and external. So, there
are two security posture values to calculate: security posture-external
threats (SPe) and security post ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512