My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2002-06-26 CC Packet
Centerville
>
City Council
>
Agenda Packets
>
1996-2022
>
2002
>
2002-06-26 CC Packet
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
5/12/2009 9:17:11 AM
Creation date
5/12/2009 9:14:50 AM
Metadata
Fields
Template:
General
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
216
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />I <br />CyberCrime & Information Security <br /> <br />Risk Assessment <br /> <br />.. <Px~x. <br />Risk = Vallll! Threaf VuJnenbiItty <br /> <br />1. Oetermine value of asset <br />.. Not easy because some value is intangible <br />- Risk is subject to debate <br />2. Determine level 01 threatlvulnerability <br />.. If you're connected to the Internet. <br />assume the threat is high <br />.... Cities are high-profile targets <br />3. Determine cost of loss <br /> <br />Risk Assessment <br /> <br />4. Determine what you must do to reduce <br />the risk and its cost <br /> <br />5. RevlewlCreate security processes and <br /> <br />procedures <br /> <br />6. Develop Security Plan to manage risk <br /> <br />7. Eliminate what you can <br /> <br />8. Mitigate as much as you can <br /> <br />9. Accept that you can't get rid of all risk <br /> <br />What Can You Do? <br /> <br />It's About Creating Layers of Protection <br /> <br /> <br />2002 LMC Annual Conference <br />Barbara GallolBrian Still <br /> <br />5 <br />
The URL can be used to link to this page
Your browser does not support the video tag.