Expert Advice Community

Guest

Threats and vulnerabilities list

  Quote
Guest
Guest user Created:   Jul 19, 2016 Last commented:   Jul 19, 2016

Threats and vulnerabilities list

Hi i have a question concerning the Threats and Vulnerabilities list, what you have is simply examples or they cover all the aspects?
0 0

Assign topic to the user

ISO 27001/ISO 22301 DISASTER RECOVERY PLAN

Recovery plan for IT and communications.

ISO 27001/ISO 22301 DISASTER RECOVERY PLAN

Recovery plan for IT and communications.

Guest
Antonio Jose Segovia Jul 19, 2016

Answer:
Our list of threats/vulnerabilities is a complete list of most common threats/vulnerabilities that covers most relevant aspects, so you can use this list for your risk management methodology. Here is our list of threats/vulnerabilities “Catalogue of threats & vulnerabilities” : https://advisera.com/27001academy/knowledgebase/threats-vulnerabilities/

By the way, if you want to develop your own methodology, this article can be also interesting for you “How to write ISO 27001 risk assessment methodology” : https://advisera.com/27001academy/knowledgebase/write-iso-27001-risk-assessment-methodology/

Finally, our online course can be also very interesting for you because we give more information about the risk management “ISO 27001:2013 Foundations Course” : https://advisera.com/training/iso-27001-foundations-course/

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Jul 19, 2016

Jul 19, 2016

Suggested Topics