tag:blogger.com,1999:blog-4088979.post111515226306038064..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Richard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-4088979.post-1115284877742660772005-05-05T05:21:00.000-04:002005-05-05T05:21:00.000-04:00Thanks for your response Richard. I didn't mean fo...Thanks for your response Richard. <BR/><BR/>I didn't mean for you to go google-hunting for me :) , but I thought you'd might know (by being a military officer and all) government/military sources that explains the formula. I have some good reference that explains the formula (your book for instance). I'll keep digging.. thanksAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1115208506400682692005-05-04T08:08:00.000-04:002005-05-04T08:08:00.000-04:00Hello Goran,That formula is used a lot. I don't t...Hello Goran,<BR/><BR/>That formula is used a lot. I don't think I cited any sources in my book. I don't really have time to track any down now. I suggest searching for "risk equation" along with the words threat and vulnerability.Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-1115194741027068332005-05-04T04:19:00.000-04:002005-05-04T04:19:00.000-04:00Hi Richard, first I'd like to congratulate you on ...Hi Richard, first I'd like to congratulate you on your terrific book, and this blog. <BR/><BR/>Related to your post, I'm using the risk=threat*vuln*asset - equation in my thesis, with reference to your book. I wonder, is this formula frequently used? I'd like to have some good reference-material, do you know of any? <BR/><BR/>Cheers<BR/>GöranAnonymousnoreply@blogger.com