![]() A sound mitigation strategy maximizes existing security resources (optimization) and prioritizes Policies first, Systems second, and Personnel third.Ī Threat Assessment is a logical process used to determine likelihood of adverse events impacting your assets and to validate security levels. Solutions for the identified risks typically enhance three facets of security: Policies, Procedures and Training Physical/Electronic Security Systems and Security Personnel. Without question, the best strategy for mitigating risk is a combination of all three elements, decreasing threats, blocking opportunities and reducing consequences.Ī logical mitigation strategy ties assets to threats to vulnerabilities to identify risks. Risk mitigation is accomplished by decreasing the threat level by eliminating or intercepting the adversary before they attack, blocking opportunities through enhanced security, or reducing the consequences if an attack should occur. ![]() The goal of most security programs is to reduce risk. Given a specific risk, there are five strategies available to security decision makers to mitigate risk: avoidance, reduction, spreading, transfer and acceptance. ![]() Security Risk Assessment – Threat Analysis Group – All rights Reserved ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |