10.10 CHAPTER STEP-BY-STEP SUMMARY


10.10 CHAPTER STEP-BY-STEP SUMMARY

  1. Read some background information on risk analysis

  2. Select a risk analysis methodology

  3. Scope your assets, missions, and security objects

  4. Work your way through one of the risk analysis methodologies

  5. Balance the impact of the threats with potential safeguards

  6. Select your safeguards and implement them

  7. Document all findings




HIPAA Security Implementation, Version 1.0
HIPAA Security Implementation, Version 1.0
ISBN: 974372722
EAN: N/A
Year: 2003
Pages: 181

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net