Risk management for computer security : Protecting your network and information assets /
Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Documento de Gobierno Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam, Netherlands ; Boston :
Elsevier Butterworth-Heinemann,
©2005.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Copyright Page
- Contents
- Foreword
- Preface
- Acknowledgments
- About the Authors
- Section I: An Introduction to Risk Management
- Chapter 1. Introduction to the Theories of Risk Management
- Chapter 2. The Changing Environment
- Chapter 3. The Art of Managing Risks
- Section II: The Threat Assessment Process
- Chapter 4. Threat Assessment and Its Input to Risk Assessment
- Chapter 5. Threat Assessment Method
- Chapter 6. Example Threat Assessment
- Section III: Vulnerability Issues
- Chapter 7. Operating System Vulnerabilities
- Chapter 8. Application Vulnerabilities
- Chapter 9. Public Domain or Commercial Off-the-Shelf Software?
- Chapter 10. Connectivity and Dependence
- Section IV: The Risk Process
- Chapter 11. What Is Risk Assessment?
- Chapter 12. Risk Analysis
- Chapter 13. Who Is Responsible?
- Section V: Tools and Types of Risk Assessment
- Chapter 14. Qualitative and Quantitative Risk Assessment
- Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management
- Chapter 16. Tools and Techniques
- Chapter 17. Integrated Risk Management
- Section VI: Future Directions
- Chapter 18. The Future of Risk Management
- Index
- Last Page.