Risk Assessment
A key step in developing a secure network
Assigns level of risks to various threats
- By comparing the nature of threats to the controls designed to reduce them
Use a control spreadsheet
- List down network assets on the side
- List threats across the top
- List the controls that are currently in use to address each threat in the corresponding cells
- Allows optimization of controls based on risk