LIST OF FIGURES AND TABLES
Figure 1.1 The journey of data
Figure 1.2 Relationship between security domains
Figure 6.1 A general view of the risk environment
Figure 6.2 The overall risk management process
Figure 6.3 A typical risk matrix
Figure 6.4 Strategic risk management options
Figure 6.5 The Plan–Do–Check–Act cycle
Figure 7.1 Business continuity timeline
Table 6.1 Typical impact scales
Get Cyber Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.