Kang | Responsive Security | Buch | sack.de

Kang Responsive Security

Be Ready to Be Secure

1. Auflage 2017, 259 Seiten, Gebunden, Format (B × H): 156 mm x 234 mm, Gewicht: 481 g
ISBN: 978-1-138-43685-5
Verlag: Taylor & Francis Ltd

Kang Responsive Security

Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a decade of action research and real-time experience, this book introduces the issues and dilemmas that fueled the study, discusses its key findings, and provides practical methods for managing information security risks. It presents the principles and methods of the responsive security approach, developed from the findings of the study, and details the research that led to the development of the approach.

Demonstrates the viability and practicality of the approach in today’s information security risk environment
Demystifies information security risk management in practice, and reveals the limitations and inadequacies of current approaches
Provides comprehensive coverage of the issues and challenges faced in managing information security risks today
The author reviews existing literature that synthesizes current knowledge, supports the need for, and highlights the significance of the responsive security approach. He also highlights the concepts, strategies, and programs commonly used to achieve information security in organizations.
Responsive Security: Be Ready to Be Secure examines the theories and knowledge in current literature, as well as the practices, related issues, and dilemmas experienced during the study. It discusses the reflexive analysis and interpretation involved in the final research cycles, and validates and refines the concepts, framework, and methodology of a responsive security approach for managing information security risk in a constantly changing risk environment.


Information security practitioners and strategists, including security managers, CIO, CSO, risk analysts, auditors, and policies/strategies professionals dealing with information security issues, academia – information security researchers and students, IT professionals interested in information security risk management in general.


Weitere Infos & Material

IntroductionBackground and MotivationsPurposeQuestionsResearch MethodologyOrganization of Subsequent ChaptersEndnotesKnowledge, Issues, and DilemmasIntroductionInformation SecurityPrinciples and ApproachesInformation Security Risk Management StrategyInformation Security ProgramResponding to ChangeCurrent Research and Social PerspectivesConclusionEndnotesPractice, Issues, and DilemmasInformation Risk Management (IRM) PracticesSocial–Technical ApproachEndnotesResponsive SecurityPiezoelectric MetaphorBETA’s Approach to Emerging Risks and AttacksLearning from Tsunami IncidentRevealing Uncertainties and Making Risks VisibleResponsive, Reactive, and Proactive Strategies
Criticality Alignment
Testing Responsive Approach at GAMMA
Learning from Antinny Worm Case Study
Refining Responsive Approach
Responsive Learning
Conclusions and Implications
Summary and Results
Conclusions about Each Research Question
Implications for Theory
Implications for Policy and Practice
Suggestions for Further Research

Kang, Meng Chow
Meng-Chow Kang, PhD, earned an MSc in information security from the Royal Holloway and Bedford New College, University of London, and completed his PhD program in information security risk management at the Southern Cross University in Australia. He co-founded the Regional Asia Information Security Exchange (RAISE) Forum (raiseforum.org) that serves as a platform for regional information sharing and contributes to international standards development in ISO and ITU-T. He has been contributing to the development and adoption of international standards relating to information security since 1998, served as the first chair for ISO/IEC JTC 1/SC 27/WG 4 on Security Controls and Services Standards development from 2006 to 2012, and his work has been recognized with numerous industry awards.

Ihre Fragen, Wünsche oder Anmerkungen

Ihre Nachricht*
Wie möchten Sie kontaktiert werden?
Ihre E-Mail-Adresse*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.