Page 118 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 118

determined. Technologies and processes to remediate threats should
               be considered and weighted according to their cost and effectiveness.

               Response options should include making adjustments to software
               architecture, altering operations and processes, and implementing
               defensive and detective components.
   113   114   115   116   117   118   119   120   121   122   123