Security Risk Assessments Made Easy

Поделиться
HTML-код
  • Опубликовано: 19 окт 2024

Комментарии • 26

  • @zaidtajaddin6931
    @zaidtajaddin6931 Год назад +1

    gooood

  • @War3lephant
    @War3lephant 2 года назад +1

    Is there any popular open source risk assessment software that can be used?

    • @BEINFOSEC
      @BEINFOSEC  2 года назад

      Hi! Thanks for your question.
      There are many different options out there. You can actually do this with a simple spreadsheet for smaller assessments.
      Or, you can could use something like SimpleRisk, PTAPro, or Eramba. The links are below. There are other options as well so be sure to research it so that it meets the needs of your organization.
      www.simplerisk.com/solutions/risk-management
      www.ptatechnologies.com/default.htm
      www.eramba.org/

  • @chandrajit04
    @chandrajit04 2 года назад +1

    Informative.

  • @aliabdari5640
    @aliabdari5640 2 года назад

    Thanks a million!

    • @BEINFOSEC
      @BEINFOSEC  2 года назад

      You are very welcome!

  • @raymondakoson5165
    @raymondakoson5165 3 года назад +1

    Great lecture. But may I differ that much as data is the jewel we are protecting, methinks the 'container' itself - the server as an asset needs protection as well. And the threat in this case is theft. The vulnerability? Is any weakness of physical security.

  • @vak21
    @vak21 3 года назад

    Hi... I have one question. At some point in time you said "This server has no data, no attacker would care about it". However, what about those attackers whose goal is to compromise machines for crypto mining? Or to use them as bots in DDoS?

    • @vak21
      @vak21 3 года назад

      @@BEINFOSEC agree. Thanks!

  • @eto895
    @eto895 5 лет назад

    Truly easy to understand..

  • @whimsicalkins5585
    @whimsicalkins5585 3 года назад +1

    Loved the video. I have a seminar to be given on this topic next week and I am sure of getting A+

  • @alfredlowe1327
    @alfredlowe1327 3 года назад

    Thank you for this excellent video.

  • @swgbiz12
    @swgbiz12 4 года назад

    Whaat do you mean by the " other ALE"
    ...from another web server?

  • @suryachandra_1787
    @suryachandra_1787 4 года назад +3

    Very well explained risk assessment session. Thanks 👍

  • @Machadoflp
    @Machadoflp 4 года назад

    Tks for the work!

  • @R3v3rs3_sh3ll
    @R3v3rs3_sh3ll 4 года назад

    Thank you so much!

  • @JaeVoris
    @JaeVoris 5 лет назад

    Great info, without experience how do I become a risk assessor?

    • @JaeVoris
      @JaeVoris 5 лет назад

      @@BEINFOSEC thanks

  • @tayygrande
    @tayygrande 5 лет назад

    that’s right dad

  • @saidmaamri9317
    @saidmaamri9317 4 года назад

    Good stuff.

  • @jackhammer7828
    @jackhammer7828 5 лет назад

    Also phishing

  • @chrismurphy4569
    @chrismurphy4569 5 лет назад

    Supper insightful

  • @jackhammer7828
    @jackhammer7828 5 лет назад

    Information personal information security information

  • @milkteaboba3348
    @milkteaboba3348 3 года назад +3

    This was a straight up and most informative video I have ever watched on Qualitative vs Quantitative assessment analysis procedures. Thank you so much for your content!