Use these risk-assessment methodologies to protect your IT infrastructure
No matter what methodology or approach is used, it is important that the organization address how asset management and proper inventorying of the organizations IT assets are to be handled.
This sample chapter, taken from Inside Network Security Assessment: Guarding Your IT Infrastructure, discusses different methodologies and approaches for conducting a risk assessment on an IT infrastructure and its assets.
Title: Inside Network Security Assessment: Guarding Your IT Infrastructure
Published: November 2005
Author: Michael Gregg, David Kim
Chapter: Chapter 4: Risk-Assessment Methodologies
Published by Sams