+ All Categories
Home > Documents > Risk Assessment in an information centric world: Threats ... · Layer 6/Presentation Layer 5/...

Risk Assessment in an information centric world: Threats ... · Layer 6/Presentation Layer 5/...

Date post: 01-Aug-2020
Category:
Upload: others
View: 4 times
Download: 1 times
Share this document with a friend
1
Risk Assessment in an information centric world: Threats, vulnerabilities, countermeasures and impacts (a work in progress) Samuel Liles What is this project trying to answer? How do you do analysis of risk across the domain of information technology using metrics based on empirical evidence for decisions that are evidence based in mitigation and allow for decision processes based on the best information? 9C1-1F7.pdf 1 3/19/2012 1:47:32 PM
Transcript
Page 1: Risk Assessment in an information centric world: Threats ... · Layer 6/Presentation Layer 5/ Session Layer 4/ Transport Layer 3/ Network Layer 2/ Data Link Layer 1/ Physical Layer

Risk Assessment in an information centric world: Threats, vulnerabilities, countermeasures and impacts (a work in progress)

Samuel Liles

What is this project trying to answer? How do you do analysis of risk across the domain of information technology using metrics based on empirical evidence for decisions

that are evidence based in mitigation and allow for decision processes based on the best information?

9C1-1F7.pdf 1 3/19/2012 1:47:32 PM

mfocosi
Typewritten Text
2012 - 9C1-1F7 - Risk Assessment in an information centric world: Threats, vulnerabilities, countermeasures and impacts (a work in progress) - Samuel Liles PLM
mfocosi
Typewritten Text
mfocosi
Typewritten Text
Recommended