Laserfiche WebLink
<br />I <br />CyberCrime & Information Security <br /> <br />Risk Assessment <br /> <br />.. <Px~x. <br />Risk = Vallll! Threaf VuJnenbiItty <br /> <br />1. Oetermine value of asset <br />.. Not easy because some value is intangible <br />- Risk is subject to debate <br />2. Determine level 01 threatlvulnerability <br />.. If you're connected to the Internet. <br />assume the threat is high <br />.... Cities are high-profile targets <br />3. Determine cost of loss <br /> <br />Risk Assessment <br /> <br />4. Determine what you must do to reduce <br />the risk and its cost <br /> <br />5. RevlewlCreate security processes and <br /> <br />procedures <br /> <br />6. Develop Security Plan to manage risk <br /> <br />7. Eliminate what you can <br /> <br />8. Mitigate as much as you can <br /> <br />9. Accept that you can't get rid of all risk <br /> <br />What Can You Do? <br /> <br />It's About Creating Layers of Protection <br /> <br /> <br />2002 LMC Annual Conference <br />Barbara GallolBrian Still <br /> <br />5 <br />