Download now Free registration required
This paper discuses a business process approach toward IT assets and risks. They described the top-down and bottom-up approach on how to assign criticality values to business processes and IT assets, and explained this concept by means of an example. They also discussed the advantages of the business process approach. Their examples in this paper are simplified in order to convey the business process message first. In reality, the situation can become much more complex. Verizon Business will continue its thought leadership on this and many other security related subjects, and they will publish their results in white papers on a regular basis.
- Format: PDF
- Size: 504.4 KB