Great lecture. But may I differ that much as data is the jewel we are protecting, methinks the 'container' itself - the server as an asset needs protection as well. And the threat in this case is theft. The vulnerability? Is any weakness of physical security.
Hi! Thanks for your question. There are many different options out there. You can actually do this with a simple spreadsheet for smaller assessments. Or, you can could use something like SimpleRisk, PTAPro, or Eramba. The links are below. There are other options as well so be sure to research it so that it meets the needs of your organization. www.simplerisk.com/solutions/risk-management www.ptatechnologies.com/default.htm www.eramba.org/
Hi... I have one question. At some point in time you said "This server has no data, no attacker would care about it". However, what about those attackers whose goal is to compromise machines for crypto mining? Or to use them as bots in DDoS?
This was a straight up and most informative video I have ever watched on Qualitative vs Quantitative assessment analysis procedures. Thank you so much for your content!
Great lecture. But may I differ that much as data is the jewel we are protecting, methinks the 'container' itself - the server as an asset needs protection as well. And the threat in this case is theft. The vulnerability? Is any weakness of physical security.
Very well explained risk assessment session. Thanks 👍
Is there any popular open source risk assessment software that can be used?
Hi! Thanks for your question.
There are many different options out there. You can actually do this with a simple spreadsheet for smaller assessments.
Or, you can could use something like SimpleRisk, PTAPro, or Eramba. The links are below. There are other options as well so be sure to research it so that it meets the needs of your organization.
www.simplerisk.com/solutions/risk-management
www.ptatechnologies.com/default.htm
www.eramba.org/
gooood
Informative.
Loved the video. I have a seminar to be given on this topic next week and I am sure of getting A+
Thank you!
Whaat do you mean by the " other ALE"
...from another web server?
Hi... I have one question. At some point in time you said "This server has no data, no attacker would care about it". However, what about those attackers whose goal is to compromise machines for crypto mining? Or to use them as bots in DDoS?
@@BEINFOSEC agree. Thanks!
Thank you for this excellent video.
Information personal information security information
Truly easy to understand..
This was a straight up and most informative video I have ever watched on Qualitative vs Quantitative assessment analysis procedures. Thank you so much for your content!
Tks for the work!
Great info, without experience how do I become a risk assessor?
@@BEINFOSEC thanks
Supper insightful
Also phishing
Thank you so much!
Good stuff.
Thanks a million!
You are very welcome!
that’s right dad
His dad is very very good