Buch, Englisch, 278 Seiten, Format (B × H): 195 mm x 238 mm, Gewicht: 621 g
Practical Assessments Through Data Collection and Data Analysis
Buch, Englisch, 278 Seiten, Format (B × H): 195 mm x 238 mm, Gewicht: 621 g
ISBN: 978-1-59749-735-0
Verlag: Elsevier Science
In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.
- Based on authors' experiences of real-world assessments, reports, and presentations
- Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
- Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment
Zielgruppe
<p>Information Security Officers, IT Auditors, IT Professionals, Chief Information Officers, Privacy Officers, Risk Officers, IT Enterprise Architects</p>
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Wirtschaftswissenschaften Betriebswirtschaft Management Risikomanagement
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
Weitere Infos & Material
Chapter 1: Information Security Risk Assessments Chapter 2: A Practical Approach Chapter 3: Data Collection Chapter 4: Data Analysis Chapter 5: Risk Assessment Chapter 6: Risk Prioritization and Treatment Chapter 7: Reporting Chapter 8: Maintenance and Wrap Up