Custom cover image
Custom cover image

Security risk management : building an information security risk management program from the ground up / Evan Wheeler

By: Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Amsterdam ; Waltham, MA : Syngress, c2011Edition: Online-AusgDescription: Online-Ressource (1 online resource (xx, 340 p.))ISBN:
  • 9781283526395
  • 1283526395
  • 9781597496162
Subject(s): Additional physical formats: 9781597496155 | 1283526360 | Erscheint auch als: 9781597496155 Druck-AusgabeDDC classification:
  • 005.8
LOC classification:
  • TK5105.59
Online resources: Summary: Front Cover -- Security Risk Management: Building an Information Security Risk Management Program from the Ground Up -- Copyright -- Table of Contents -- Preface -- Intended Audience -- Organization of This Book -- Acknowledgments -- About the Author -- About the Technical Editor -- Part I: Introduction to Risk Management -- Chapter 1. The Security Evolution -- Introduction -- How We Got Here -- A Risk-Focused Future -- Information Security Fundamentals -- The Death of Information Security -- Summary -- References -- Chapter 2. Risky Business -- Introduction -- Applying Risk Management to Information Security -- Business-Driven Security Program -- Security as an Investment -- Qualitative versus Quantitative -- Summary -- References -- Chapter 3. The Risk Management Lifecycle -- Introduction -- Stages of the Risk Management Lifecycle -- Business Impact Assessment -- A Vulnerability Assessment Is Not a Risk Assessment -- Making Risk Decisions -- Mitigation Planning and Long-Term Strategy -- Process Ownership -- Summary -- Part II: Risk Assessment and AnalysisTechniques -- Chapter 4. Risk Profiling -- Introduction -- How Risk Sensitivity Is Measured -- Asking the Right Questions -- Assessing Risk Appetite -- Summary -- Reference -- Chapter 5. Formulating a Risk -- Introduction -- Breaking Down a Risk -- Who or What Is the Threat? -- Summary -- References -- Chapter 6. Risk Exposure Factors -- Introduction -- Qualitative Risk Measures -- Risk Assessment -- Summary -- Reference -- Chapter 7. Security Controls and Services -- Introduction -- Fundamental Security Services -- Recommended Controls -- Summary -- Reference -- Chapter 8. Risk Evaluation and Mitigation Strategies -- Introduction -- Risk Evaluation -- Risk Mitigation Planning -- Policy Exceptions and Risk Acceptance -- Summary -- Chapter 9. Reports and Consulting -- Introduction.PPN: PPN: 809830973Package identifier: Produktsigel: ZDB-26-MYL | ZDB-30-PAD | ZDB-30-PQE
No physical items for this record