Team LiB   Previous Section   Next Section

Part I: Introduction

Part I provides an executive overview of self-directed information security risk evaluations and how they fit into the overall management of information security risks. Specifically, it introduces the Operationally Critical Threat, Asset, and Vulnerability Evaluation[SM] (OCTAVE[SM]) approach to assessments and the OCTAVE Method. Chapter 1 gives background on information security risk evaluations and the OCTAVE approach to assessing information security risks. Chapter 2 discusses the principles, attributes, and outputs that define a comprehensive, self-directed evaluation.

[SM] Operationally Critical Threat, Asset, and Vulnerability Evaluation and OCTAVE are service marks of Carnegie Mellon University.

Chapter
 

1 Managing Information Security Risks

 

2 Principles and Attributes of Information Security Risk Evaluations

    Team LiB   Previous Section   Next Section