You have successfully completed Step 2 !
What you have accomplished so far:
Your completed Step 1 defines your Security Perimeter.
Your completed step 2 establishes the Business Impact.
Our Security Team continues to analyze the data.
What's Next?
Step 3 is a Threat Assessment. In this step you will determine the LIKELIHOOD of a threat occurring. This step will take about 10 minutes. Again you may finish it all at once or save it to finish later.
You will be using the following criteria:
What is the LIKELIHOOD of the threat occurring? You will be rating the likelihood as:
VERY LOW = Highly unlikely to occur - less that once very 10 years
LOW = Unlikely to occur - less than once a year but more than once every 10 years
MODERATE = Somewhat likely to occur - between 1 and 10 times a year
HIGH = Highly likely to occur - between 10-100 times a year
VERY HIGH = Almost certain to occur - more than 100 times a year
Your completed Step 1 defines your Security Perimeter.
Your completed step 2 establishes the Business Impact.
Our Security Team continues to analyze the data.
What's Next?
Step 3 is a Threat Assessment. In this step you will determine the LIKELIHOOD of a threat occurring. This step will take about 10 minutes. Again you may finish it all at once or save it to finish later.
You will be using the following criteria:
What is the LIKELIHOOD of the threat occurring? You will be rating the likelihood as:
VERY LOW = Highly unlikely to occur - less that once very 10 years
LOW = Unlikely to occur - less than once a year but more than once every 10 years
MODERATE = Somewhat likely to occur - between 1 and 10 times a year
HIGH = Highly likely to occur - between 10-100 times a year
VERY HIGH = Almost certain to occur - more than 100 times a year