Sponsored Content
Full Discussion: How many...
Special Forums Cybersecurity How many... Post 5643 by Neo on Sunday 19th of August 2001 11:15:47 PM
Old 08-20-2001
It is really based on risk. Folks who are not protecting sensitive data, financial transacations, etc. may not have a high enough risk criteria to spend lots of time on security.

The process is one of risk assessment, risk management.

Refer to this paper for more details on the process of risk management:

http://www.silkroad.com/papers/pdf/m..._paper_430.pdf

 
All times are GMT -4. The time now is 11:19 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy