-First step is to identify the assets. (in some cases critical process)
-Second step is to identify relevant risk. (vulnerability/threat)
-Third step is to do impact analysis. (qualitative or quantitative)
-Fourth step is prioritizing the risk on the basis of impact.
-Fifth step is to evaluate controls.
-Sixth step is to apply appropriate controls.
-Second step is to identify relevant risk. (vulnerability/threat)
-Third step is to do impact analysis. (qualitative or quantitative)
-Fourth step is prioritizing the risk on the basis of impact.
-Fifth step is to evaluate controls.
-Sixth step is to apply appropriate controls.
No comments:
Post a Comment