Figure 1.1 The journey of data
Figure 1.2 Relationship between security domains
Figure 6.1 A general view of the risk environment
Figure 6.2 The overall risk management process
Figure 6.3 A typical risk matrix
Figure 6.4 Strategic risk management options
Figure 6.5 The Plan–Do–Check–Act cycle
Figure 7.1 Business continuity timeline
Table 6.1 Typical impact scales