JavaScript required
We’re sorry, but Coda doesn’t work properly without JavaScript enabled.
Skip to content
Gallery
Cyber Security and Networking Course
1. The Internet
2. Network model and technology
3. Cybers Attack Types
4. Hardware, Software and Physical security
5. Risk Reduction
6. Introduction to Cryptography (Lab)
7. Digital Forensics
8. Lab
9. Access Control and Authentication
10. Personal Security
More
Share
Explore
5. Risk Reduction
Data Backup
Security Check up
Threat assessment
- Environmental
- Manmade
- Internal vs. external
Risk assessment
- Asset value
- Likelihood of occurrence
- Impact
- Testing
- Penetration testing authorization
- Risk response techniques
- Accept
- Transfer
- Avoid
- Mitigate
Response Procedures
- Preparation
- Identification
- Containment
- Eradication
- Recovery
- Lessons learned
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
Ctrl
P
) instead.