X hits on this document

Powerpoint document

3 Security Policies, Standards, and Planning - page 38 / 55

189 views

0 shares

0 downloads

0 comments

38 / 55

Firewalls & Network Security, 2nd ed. - Chapter 3

Business Impact Analysis

Begin with business impact analysis (BIA)

If the attack succeeds, what do we do then?

CP team conducts BIA in the following stages:

Threat attack identification

Business unit analysis

Attack success scenarios

Potential damage assessment

Subordinate plan classification

Firewalls & Network Security, 2nd ed. - Chapter 3

Document info
Document views189
Page views189
Page last viewedThu Dec 08 06:05:04 UTC 2016
Pages55
Paragraphs604
Words4124

Comments