TARA tagged posts:

Prioritizing Information Security Risks with Threat Agent Risk Assessment

October 12th, 2010 |
Prioritizing Information Security Risks with Threat Agent Risk Assessment

IT Business Value: Intel IT has developed a threat agent risk assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This methodology identifies threat agents ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , ,