عرض عادي

Information security risk assessment toolkit : practical assessments through data collection and data analysis / Mark Talabis, Jason Martin.

بواسطة:المساهم (المساهمين):نوع المادة : نصنصالناشر:Amsterdam ; Boston : Elsevier, [2013]تاريخ حقوق النشر: ©2013وصف:xix, 258 pages ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781597497350
  • 1597497355
الموضوع:تصنيف مكتبة الكونجرس:
  • QA76.9.A25 T336 2013
المحتويات:
Ch. 1. Information Security Risk Assessments -- Ch. 2. Information Security Risk Assessment: A Practical Approach -- Ch. 3. Information Security Risk Assessment: Data Collection -- Ch. 4. Information Security Risk Assessment Data Analysis -- Ch. 5. Information Security Risk Assessment: Risk Assessment -- Ch. 6. Information Security Risk Assessment: Risk Prioritization and Treatment -- Ch. 7. Information Security Risk Assessment: Reporting -- Ch. 8. Information Security Risk Assessment: Maintenance and Wrap Up.
ملخص:In order to protect company's information assets such as sensitive customer records, health care records, et cetera, the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. "Information Security Risk Assessments" gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. It is based on authors' experiences of real-world assessments, reports, and presentations. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. It includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 T336 2013 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010011138462
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 T336 2013 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010011138463

Includes index.

Ch. 1. Information Security Risk Assessments -- Ch. 2. Information Security Risk Assessment: A Practical Approach -- Ch. 3. Information Security Risk Assessment: Data Collection -- Ch. 4. Information Security Risk Assessment Data Analysis -- Ch. 5. Information Security Risk Assessment: Risk Assessment -- Ch. 6. Information Security Risk Assessment: Risk Prioritization and Treatment -- Ch. 7. Information Security Risk Assessment: Reporting -- Ch. 8. Information Security Risk Assessment: Maintenance and Wrap Up.

In order to protect company's information assets such as sensitive customer records, health care records, et cetera, the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. "Information Security Risk Assessments" gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. It is based on authors' experiences of real-world assessments, reports, and presentations. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. It includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة