DEC 31, 1969

Web Seminars

Turning the IoT into opportunities
January 31, 2017

Information Security Risk Analysis

Print
Reprints
Email

Introduces risk analysis techniques that can be used to identify and quantify both accidental and malicious threats to computer systems within an organization. The author walks through the qualitative risk analysis process using such techniques as the practical application of risk analysis (PARA) and the facilitated risk analysis process (FRAP). A case study of a truck rental company illustrates application of the method. The appendices provide a questionnaire and sample process forms.

Click here to buy this book

Please note you must now log in with your email address and password.