Information Security Risk Assessment Too
โ
Mark Talabis, Jason Martin
๐
Article
๐
2013
๐
Elsevier
๐
English
โ 627 KB
In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attent