Cargando…

IT security risk control management : an audit preparation plan /

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Pompon, Raymond (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [New York, New York] : Apress, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn971245719
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170203s2016 nyua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d YDX  |d NJR  |d OCLCF  |d CN3GA  |d C6I  |d OCLCA  |d OCLCQ  |d OCL  |d CEF  |d KSU  |d OCLCQ  |d DEBBG  |d UAB  |d HS0  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 958864619  |a 1165383535 
020 |a 9781484221402 
020 |a 1484221400 
020 |z 9781484221396 
020 |z 1484221397 
024 7 |a 10.1007/978-1-4842-2140-2.  |2 doi 
029 1 |a GBVCP  |b 897166132 
035 |a (OCoLC)971245719  |z (OCoLC)958864619  |z (OCoLC)1165383535 
037 |a CL0500000826  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a UR.  |2 bicssc 
072 7 |a COM053000.  |2 bisacsh 
072 7 |a UR.  |2 thema 
082 0 4 |a 658.478  |2 23 
049 |a UAMI 
100 1 |a Pompon, Raymond,  |e author. 
245 1 0 |a IT security risk control management :  |b an audit preparation plan /  |c Raymond Pompon. 
246 3 |a Information technology security risk control management 
264 1 |a [New York, New York] :  |b Apress,  |c [2016] 
264 2 |a New York, NY :  |b Distributed by Springer Science+Business Media New York 
264 4 |c ©2016 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from cover (viewed January 31, 2017). 
500 |a Place of publication from publisher's Web site (viewed January 31, 2017). 
500 |a Includes index. 
505 0 |a Part I: Getting a Handle on Things -- Chapter 1: Why Audit. Chapter 2: Assume Breach. Chapter 3: Risk Analysis: Assets and Impacts. Chapter 4: Risk Analysis: Natural Threats. Chapter 5: Risk Analysis: Adversarial Risk. Part II: Wrangling the Organization -- Chapter 6: Scope. Chapter 7: Governance. Chapter 8: Talking to the Suits. Chapter 9: Talking to the Techs. Chapter 10: Talking to the Users. Part III: Managing Risk with Controls -- Chapter 11: Policy. Chapter 12: Control Design. Chapter 13: Administrative Controls. Chapter 14: Vulnerability Management. Chapter 15: People Controls. Chapter 16: Logical Access Control. Chapter 17: Network Security Controls. Chapter 18: More Technical Controls. Chapter 19: Physical Security Controls. Part IV: Being Audited.-C hapter 20: Response Controls. Chapter 21: Starting the Audit. Chapter 22: Internal Audit. Chapter 23: Third Party Security. Chapter 24: Post Audit Improvement. 
520 |a Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security Risk Control Management provides step-by-step guidance for IT professionals on how to craft a successful security program. Readers will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes, including: Building a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constant changing threats Preparing for and passing such common audits as PCI-DSS, SSAE-16, and ISO 27001. Calibrating the scope, and customizing security controls to fit into an organization?s culture. Implementing the most challenging processes, pointing out common pitfalls and distractions. Framing security and risk issues to be clear and actionable so that decision makers, technical personnel, and users will listen and value your advice. With IT Security Risk Control Management, you will be able to construct an information security program, from inception to audit, with enduring, practical, hands-on advice, and actionable strategies for IT professionals. 
504 |a Includes bibliographical references at the end of each chapters and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures  |x Management. 
650 0 |a Computer security. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures  |x Gestion. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |a Pompon, Raymond.  |t IT security risk control management.  |d ©2016  |z 1484221397  |z 9781484221396  |w (OCoLC)953842849 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484221402/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 13173227 
994 |a 92  |b IZTAP