Donny Koh

9%
Flag icon
Trike provides a method of performing a security audit in a reliable and repeatable procedure. It also provides a consistent framework for communication and collaboration among security workers. Trike is used to craft an assessment of an acceptable level of risk for each class of asset that is then used to determine appropriate risk response actions.
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Rate this book
Clear rating