|Transportation Security | Physical Security | Firewall Pro | Network Security | S.C.A.D.A. | H.I.P.A.A. | eBanking | Kids' Password|
Value of affected assets should be assigned to each of the applicable vulnerabilities:
Cost should be assigned to each of the selected countermeasures:
Cost of countermeasures should not exceed the value of assets protected by the mitigated vulnerabilities.
Copyright © 2007 InfoSecPro.com™