X hits on this document

Powerpoint document

3 Security Policies, Standards, and Planning - page 39 / 55

158 views

0 shares

0 downloads

0 comments

39 / 55

Firewalls & Network Security, 2nd ed. - Chapter 3

Threat Attack Identification and Prioritization

Update threat list with latest developments and add the attack profile

Attack profile is the detailed description of activities during an attack

Must be developed for every serious threat the organization faces

Used to determine the extent of damage that could result to business unit if attack were successful

Firewalls & Network Security, 2nd ed. - Chapter 3

Document info
Document views158
Page views158
Page last viewedFri Dec 02 23:01:03 UTC 2016
Pages55
Paragraphs604
Words4124

Comments