Buch, Englisch, 114 Seiten, Format (B × H): 161 mm x 240 mm, Gewicht: 347 g
DevOps
Buch, Englisch, 114 Seiten, Format (B × H): 161 mm x 240 mm, Gewicht: 347 g
ISBN: 978-1-032-51894-7
Verlag: CRC Press
Optimal Spending on Cybersecurity Measures: DevOps aims to discuss the integration of risk management methodologies within the DevOps process.
This book introduces the cyber risk investment model, and the cybersecurity risk management framework within the DevOps process. This can be used by various stakeholders who are involved in the implementation of cybersecurity measures to safeguard sensitive data. This framework facilitates an organization’s risk management decision-making process to demonstrate the mechanisms in place to fund cybersecurity measures within DevOps practices, and demonstrates the application of the process using a case study: Cascade. This book also discusses the elements used within DevOps, DevSecOps, and will define a strategic approach to minimize cybersecurity risks within DevOps known as DevRiskOps.
Features:
- Aims to strengthen the reader’s understanding of industry governance, risk and compliance practices.
- Incorporates an innovative approach to assess cyber security initiatives with DevOps.
- Explores the strategic decisions made by organizations when implementing cybersecurity measures and leverages an integrated approach to include risk management elements into DevOps.
Zielgruppe
Further/Vocational Education, Professional Practice & Development, and Professional Reference
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
Chapter 1: Introduction
Chapter 2: DevOps
Chapter 3: Secure Development Lifecycle
Chapter 4: Enterprise Risk Management Framework
Chapter 5: DevRiskOps
Chapter 6: Case Study