1
Risk Assessment in an information centric world: Threats, vulnerabilities, countermeasures and impacts (a work in progress) Samuel Liles What is this project trying to answer? How do you do analysis of risk across the domain of information technology using metrics based on empirical evidence for decisions that are evidence based in mitigation and allow for decision processes based on the best information? 9C1-1F7.pdf 1 3/19/2012 1:47:32 PM

Risk Assessment in an information centric world: Threats ... · Layer 6/Presentation Layer 5/ Session Layer 4/ Transport Layer 3/ Network Layer 2/ Data Link Layer 1/ Physical Layer

  • Upload
    others

  • View
    12

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Risk Assessment in an information centric world: Threats ... · Layer 6/Presentation Layer 5/ Session Layer 4/ Transport Layer 3/ Network Layer 2/ Data Link Layer 1/ Physical Layer

Risk Assessment in an information centric world: Threats, vulnerabilities, countermeasures and impacts (a work in progress)

Samuel Liles

What is this project trying to answer? How do you do analysis of risk across the domain of information technology using metrics based on empirical evidence for decisions

that are evidence based in mitigation and allow for decision processes based on the best information?

9C1-1F7.pdf 1 3/19/2012 1:47:32 PM

mfocosi
Typewritten Text
2012 - 9C1-1F7 - Risk Assessment in an information centric world: Threats, vulnerabilities, countermeasures and impacts (a work in progress) - Samuel Liles PLM
mfocosi
Typewritten Text
mfocosi
Typewritten Text