5. Risk Reduction

Data Backup
Security Check up
Threat assessment
- Environmental
- Manmade
- Internal vs. external
Risk assessment
- Asset value
- Likelihood of occurrence
- Impact
- Testing
- Penetration testing authorization
- Risk response techniques
- Accept
- Transfer
- Avoid
- Mitigate
Response Procedures
- Preparation
- Identification
- Containment
- Eradication
- Recovery
- Lessons learned

Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.