X hits on this document

Powerpoint document

3 Security Policies, Standards, and Planning - page 39 / 55

263 views

0 shares

0 downloads

0 comments

39 / 55

Firewalls & Network Security, 2nd ed. - Chapter 3

Threat Attack Identification and Prioritization

Update threat list with latest developments and add the attack profile

Attack profile is the detailed description of activities during an attack

Must be developed for every serious threat the organization faces

Used to determine the extent of damage that could result to business unit if attack were successful

Firewalls & Network Security, 2nd ed. - Chapter 3

Document info
Document views263
Page views263
Page last viewedTue Jan 17 11:58:59 UTC 2017
Pages55
Paragraphs604
Words4124

Comments