Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

Summary > Summary - Pg. 283

Summary 283 ID 1 1 Threat universe 22,000 users 4 22,000 users 4 users Vulnerability risk Cross site scripting 4 Leaks internal IP address 2 Risk sensitivity Moderate 3 Moderate 3 Risk exposure Extreme 48 Moderate 24 FIGURE 13.7 Risk analysis worksheet example. to another resource. For example, if the resource in Figure 13.7 had these same vulnerabilities that were not addressed, think how that would affect another resource on the same network segment that had a high-risk sensitivity. Legacy Migration Workflow The same security architecture risk analysis workflow described above applies to the general process for bringing legacy resources into compliance with the security