Cargando…

Risk management for computer security : Protecting your network and information assets /

Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Jones, Andy, 1952-
Otros Autores: Ashenden, Debi
Formato: Documento de Gobierno Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam, Netherlands ; Boston : Elsevier Butterworth-Heinemann, ©2005.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • Copyright Page
  • Contents
  • Foreword
  • Preface
  • Acknowledgments
  • About the Authors
  • Section I: An Introduction to Risk Management
  • Chapter 1. Introduction to the Theories of Risk Management
  • Chapter 2. The Changing Environment
  • Chapter 3. The Art of Managing Risks
  • Section II: The Threat Assessment Process
  • Chapter 4. Threat Assessment and Its Input to Risk Assessment
  • Chapter 5. Threat Assessment Method
  • Chapter 6. Example Threat Assessment
  • Section III: Vulnerability Issues
  • Chapter 7. Operating System Vulnerabilities
  • Chapter 8. Application Vulnerabilities
  • Chapter 9. Public Domain or Commercial Off-the-Shelf Software?
  • Chapter 10. Connectivity and Dependence
  • Section IV: The Risk Process
  • Chapter 11. What Is Risk Assessment?
  • Chapter 12. Risk Analysis
  • Chapter 13. Who Is Responsible?
  • Section V: Tools and Types of Risk Assessment
  • Chapter 14. Qualitative and Quantitative Risk Assessment
  • Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management
  • Chapter 16. Tools and Techniques
  • Chapter 17. Integrated Risk Management
  • Section VI: Future Directions
  • Chapter 18. The Future of Risk Management
  • Index
  • Last Page.