{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Unit 3-2 Risk Analysis [Compatibility Mode]

Unit 3-2 Risk Analysis [Compatibility Mode] - Unit 3 Risk...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
12/19/2010 1 Unit 3: Risk Analysis Part 2 Click Here To Start Audio Microsoft Security Risk Management Discipline Nine Steps as outlined in Securing Windows 2000 Server Asset Assessment and valuation Identifying security risks Analyzing and Prioritizing Security Risks Security Risk Tracking Security Remediation Development Security Remediation Testing Capturing Security Knowledge Reassessing new and changed assets and security risks Stabilizing and deploying new or changed countermeasures. Threat Assessment circle5 Focus on Security Services ◦ Confidentiality ◦ Integrity ◦ Availability circle5 Recommends Policy Review
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
12/19/2010 2 Threat Analysis Threat Motives + Exploit Methods + Asset Vulnerabilities = Attack Risk Planning circle5 Proactive Strategy Determine Damage Determine Vulnerabilities
Background image of page 2
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}