Guide To Network Defense and Countermeasures
Guide To Network Defense and Countermeasures
Countermeasures
Second Edition
Chapter 2
Security Policy Design: Risk Analysis
Objectives
• Risk management
– Process of identifying, choosing, and setting up
countermeasures justified by the risk you identify
– Countermeasures go into your security policy
• Electronic assets
– Word processing, spreadsheet, Web page, and other
documents
• Logical assets
– E-mail messages, any records of instant messaging
conversations, and log files
• Data assets
– Personnel, customer, and financial information