Directory of business continuity planning and  
disaster recovery planning software and services  
A launch pad for business continuity & disaster recovery needs  

 Directory of Software & Services for Business Impact Analysis and Disaster Recovery Contact Us Front Page
 

Qualitative Risk Analysis
Building a Security Model

(A Presentation)






ELEMENTS IN THE EQUATION

 

 

 

THREAT:            Nasty things that can happen

 

 

 

ATTACK:            Made by a threat when it occurs

 

 

 

VULNERABILITY:     Weakness... makes a system more prone to attack or an attack more likely to succeed

 

 

 

CONTROL:           A control is a 'countermeasure' for a vulnerability.

 

 

 

IMPACT:            A successful attack has an impact

 

 

 

BUSINESS IMPACT:   This is what we must reduce or prevent!

 

 

 

 

 

ALL THESE PUT TOGETHER GIVE US A FRAMEWORK TO WITH WHICH TO MANAGE SECURITY

 







Return to Risk Analysis Page




HOME ~ WEBLINKS ~ CONTACTS

==> SOFTWARE DOWNLOAD AREA <==


Copyright © 1993-2002