Security Planning and Risk Management
After the last few chapters in which we spent lots of time and effort dealing with the issue of privacy, it’s time to get back to cybersecurity. This time, we are going to move to something called risk management. But, before moving into risk management, we need to understand the basics by learning a bit of the jargon as well as considering what the real menaces to security in an entity can be.
In the next few pages, we will cover topics such as security threats, challenges, and risk management in depth. If you want to know more about the subject, I strongly suggest you obtain a book specifically focusing on the topic.
In this chapter, we will explore the following topics:
- Security threats and challenges
- Implementing a risk management program