Assessing the security risk: The OCTAVE method

20

Author: JT Smith

highlander of CIOL writes: “Information systems are vital for any organization and the first step to address that is to understand the risks in relation to an organization’s mission and its key assets. By following the OCTAVE method, an organization can make information-protection decisions based on risks to the availability of critical information technology assets.”

Category:

  • Linux