Use these risk-assessment methodologies to protect your IT infrastructure

Download Now Free registration required

Executive Summary

No matter what methodology or approach is used, it is important that the organization address how asset management and proper inventorying of the organizations IT assets are to be handled.

This sample chapter, taken from Inside Network Security Assessment: Guarding Your IT Infrastructure, discusses different methodologies and approaches for conducting a risk assessment on an IT infrastructure and its assets.

Title: Inside Network Security Assessment: Guarding Your IT Infrastructure
ISBN: 0672328097
Published: November 2005
Author: Michael Gregg, David Kim
Chapter: Chapter 4: Risk-Assessment Methodologies
Published by Sams

  • Format: PDF
  • Size: 360 KB