4. RISK MANAGEMENT IN CURRENT AND FUTURE NETWORKS

  1. Stuart Jacobs

Published Online: 25 OCT 2013

DOI: 10.1002/9781118741580.ch4

Security Management of Next Generation Telecommunications Networks and Services

Security Management of Next Generation Telecommunications Networks and Services

How to Cite

Jacobs, S. (2013) RISK MANAGEMENT IN CURRENT AND FUTURE NETWORKS, in Security Management of Next Generation Telecommunications Networks and Services, John Wiley & Sons, Inc, Hoboken, NJ. doi: 10.1002/9781118741580.ch4

Publication History

  1. Published Online: 25 OCT 2013
  2. Published Print: 25 NOV 2013

ISBN Information

Print ISBN: 9780470565131

Online ISBN: 9781118741580

SEARCH

Keywords:

  • risk management;
  • risk mitigation controls;
  • threat-vulnerability analysis (TVA)

Summary

This chapter addresses the security risk identification, analysis, and mitigation, typically referred to as risk management. Risk management is the methodological process of identifying risks, analyzing the extent of damage that can be caused by these risks, and determining how to mitigate (reduce) risks. The term threat-vulnerability analysis (TVA) is often used to refer to activities that are part of risk management. Risk management begins with the identification and compiling of an inventory of enterprise assets. Once the decision has been made to deploy new security controls, a project plan should be established and a deployment team assembled. The majority of risk mitigation controls are either technical or procedural in nature. The chapter first discusses the development and deployment of procedural risk mitigation controls. Regardless of how services, products, and infrastructure elements are acquired, there are a series of verification tests that need to be performed.

Controlled Vocabulary Terms

risk management