Information Risk Management : a Practitioner's Guide /
This book provides a practical guide to implementing an information risk management process. The author takes you logically through the steps required to identify, assess and manage information risks within an organisation. Each step is explained clearly, supported by several generic examples, such...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
London :
BCS,
2014.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover; Copyright; CONTENTS; LIST OF FIGURES AND TABLES; AUTHOR; ACKNOWLEDGMENTS; ABBREVIATIONS; DEFINITIONS, STANDARDS AND GLOSSARY OF TERMS; PREFACE; 1 THE NEED FOR INFORMATION RISK MANAGEMENT; INTRODUCTION; WHAT IS INFORMATION?; THE INFORMATION LIFE CYCLE; WHO SHOULD USE INFORMATION RISK MANAGEMENT?; THE LEGAL FRAMEWORK; THE CONTEXT OF RISK IN THE ORGANISATION; THE BENEFITS OF TAKING ACCOUNT OF INFORMATION RISK; OVERVIEW OF THE INFORMATION RISK MANAGEMENT PROCESS; 2 REVIEW OF INFORMATION SECURITY FUNDAMENTALS; INFORMATION CLASSIFICATION; PLAN, DO, CHECK, ACT.
- 3 the information risk management programmegoals, scope and objectives; roles and responsibilities; governance of the risk management programme; information risk management criteria; 4 risk identification; the approach to risk identification; impact assessment; types of impact; qualitative and quantitative assessments; 5 threat and vulnerability assessment; conducting threat assessments; conducting vulnerability assessments; identification of existing controls; 6 risk analysis and risk evaluation; assessment of likelihood; risk analysis; risk evaluation; 7 risk treatment.
- Strategic risk optionstactical risk management controls; operational risk management controls; examples of critical controls and control categories; 8 risk reporting and presentation; business cases; risk treatment decision-making; risk treatment planning and implementation; business continuity and disaster recovery; 9 communication, consultation, monitoring and review; communication; consultation; risk reviews and monitoring; 10 the cesg ia certification scheme; the cesg ia certification scheme; skills framework for the information age (sfia); the iisp information security skills framework.
- 11 hmg security-related documentshmg security policy framework; uk government security classifications; appendix a taxonomies and descriptions; information risk; typical impacts or consequences; appendix b typical threats and hazards; malicious intrusion (hacking); environmental threats; errors and failures; social engineering; misuse and abuse; physical threats; malware; appendix c typical vulnerabilities; access control; poor procedures; physical and environmental security; communications and operations management; people-related security failures; appendix d information risk controls.
- Strategic controlstactical controls; operational controls; critical security controls version 5.0; iso/iec 27001 controls; nist special publication 800-53 revision 4; appendix e methodologies, guidelines and tools; methodologies; other guidelines and tools; appendix f templates; appendix g hmg cyber security guidelines; hmg cyber essentials scheme; 10 steps to cyber security; appendix h references and further reading; primary uk legislation; good practice guidelines; other reference material; cesg certified professional scheme; other uk government publications; risk management methodologies.