0% found this document useful (0 votes)
38 views

Business Analysis: Identify Bussiness Process

This document outlines a 5-step process for analyzing the security of a business process. The steps include: 1) Identifying the business process, 2) Identifying potential security threats, 3) Analyzing the business impact of those threats, 4) Identifying a recovery plan, and 5) Proposing a cyber impact analysis document.

Uploaded by

KEBESHER
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Business Analysis: Identify Bussiness Process

This document outlines a 5-step process for analyzing the security of a business process. The steps include: 1) Identifying the business process, 2) Identifying potential security threats, 3) Analyzing the business impact of those threats, 4) Identifying a recovery plan, and 5) Proposing a cyber impact analysis document.

Uploaded by

KEBESHER
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Created by Unlicensed Version

1.IDENTIFY BUSSINESS PROCESS

5.PROPOSE CYBER
IMPACT ANALYSIS
DOCUMMENT
2.IDENTIFY POTENTIAL
BUSSINESS
Text SECURITY
TREATH

Created by Unlicensed Version


BUSINESS ANALYSIS

4.IDENTIFY RECOVERY PLAN


3.business
Text impact

Created by Unlicensed Version


Created by Unlicensed Version

Created by Unlicensed Version

Created by Unlicensed Vers


Created by Unlicensed Version

Created by Unlicensed Version

Created by Unlicensed Vers

You might also like