X hits on this document

Powerpoint document

3 Security Policies, Standards, and Planning - page 38 / 55

282 views

0 shares

0 downloads

0 comments

38 / 55

Firewalls & Network Security, 2nd ed. - Chapter 3

Business Impact Analysis

Begin with business impact analysis (BIA)

If the attack succeeds, what do we do then?

CP team conducts BIA in the following stages:

Threat attack identification

Business unit analysis

Attack success scenarios

Potential damage assessment

Subordinate plan classification

Firewalls & Network Security, 2nd ed. - Chapter 3

Document info
Document views282
Page views282
Page last viewedFri Jan 20 16:59:52 UTC 2017
Pages55
Paragraphs604
Words4124

Comments