‚ < ‚ Free Open Study ‚ > ‚ |
Computer and information security always, in some manner, deals with risk and how to manage it. In many information security professionals' minds, the beginning point in the practice of information security is risk analysis. This chapter deals with risk analysis and its relationship to incident response. Major topics include risk analysis, types of risk, obtaining data about risk, and using the results of risk analysis. |
‚ < ‚ Free Open Study ‚ > ‚ |