Using risk assessment to prevent cyber attacks
Description
Managing information security risks through a cycle of risk management activities that include (1) assessing risk and determining protection needs, (2) selecting and implementing cost-effective policies and controls to meet these needs, (3) promoting awareness of policies and controls and of the risks that prompted their adoption, and (4) implementing a program of routine tests and examinations for evaluating the effectiveness of policies and related controls.
Broader
Metadata
Database
Global strategies
Type
(E) Emanations of other strategies
Content quality
Yet to rate
Language
English
Last update
Dec 3, 2024