cybersecurity

A collection of 4 posts
Understanding the Risk Management Process - Part 2
cybersecurity

Understanding the Risk Management Process - Part 2

This is in continuation of https://www.googlinux.com/understanding-the-risk-management-process/ Considering Vulnerabilities, Threats, and Risks * Confidentiality, Integrity, and Availability (CIA) factors span the risk management assessments of vulnerabilities, threats, and risks. * Assets can be categorized as data, systems, facilities, and people. Concerning information assets, the enterprise should consider vulnerabilities, threats,
3 min read