Cargando…

Information Risk Management A practitioner's guide

Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sutton, David (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Swindon BCS, The Chartered Institute for IT 2021
Edición:2nd.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1277198003
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 211019t20212021xxk fo 000 0 eng d
040 |a BCSLD  |b eng  |c BCSLD  |d BCSLD  |d UKAHL  |d ORMDA  |d OCLCF  |d OCLCQ 
019 |a 1277195342 
020 |a 1780175744  |q (electronic bk.) 
020 |a 9781780175744  |q (electronic bk.) 
020 |a 1780175752  |q (electronic bk.) 
020 |a 9781780175751  |q (electronic bk.) 
035 |a (OCoLC)1277198003  |z (OCoLC)1277195342 
037 |a 9781780175744 
037 |a 9781780175751  |b O'Reilly Media 
050 4 |a HD30.2 
072 7 |a UR  |2 bicssc 
072 7 |a COM039000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a URD  |2 bicssc 
072 7 |a BUS083000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
072 7 |a URD  |2 thema 
082 0 4 |a 658.4038  |2 23 
049 |a UAMI 
100 1 |a Sutton, David  |e author. 
245 1 0 |a Information Risk Management  |b A practitioner's guide  |c David Sutton. 
250 |a 2nd. 
264 1 |a Swindon  |b BCS, The Chartered Institute for IT  |c 2021 
264 4 |c Ã2021 
300 |a 1 online resource (274 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
500 |a "BCS Learning & Development Limited" 
505 0 |a 1. The need for information risk management2. Review of information security fundamentals3. The information risk management programme 4. Risk identification 5. Threat and vulnerability assessment 6. Risk analysis and risk evaluation 7. Risk treatment 8. Risk reporting and presentation 9. Communication, consultation, monitoring and review 10. The NCSC Certified Certification scheme 11. HMG Security-related documents 12. Appendix A -- Taxonomies and descriptions 13. Appendix B -- Typical threats and hazards 14. Appendix C -- Typical vulnerabilities 15. Appendix D -- Information Risk Controls 16. Appendix E -- Methodologies, guidelines and tools 17. Appendix F -- Templates 18. Appendix G -- HMG cyber security guidelines 19. References and further reading 
520 |a Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline. 
545 0 |a David Sutton's career in IT spans more than 50 years and includes voice and data networking, information security and critical information infrastructure protection. He has been a member of the BCS Professional Certification Information Security Panel since 2005 and has delivered lectures on information risk management and business continuity at the Royal Holloway University of London. He is the author of BCS book 'Cyber Security' and co-author of 'Information Security Management Principles' and 'Data Governance.' 
588 0 |a Vendor-supplied metadata. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Management. 
650 0 |a Risk management. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Privacy & data protection.  |2 bicssc 
650 7 |a COMPUTERS / Management Information Systems.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS / Information Management.  |2 bisacsh 
650 7 |a COMPUTERS / Security / General.  |2 bisacsh 
650 7 |a Information technology  |x Management.  |2 fast  |0 (OCoLC)fst00973112 
650 7 |a Risk management.  |2 fast  |0 (OCoLC)fst01098164 
650 7 |a Computer security.  |2 thema 
650 7 |a Privacy and data protection.  |2 thema 
776 0 8 |i Print version:  |z 9781780175751 
776 0 8 |i Print version:  |z 9781780175720 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781780175751/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39059099 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39059100 
938 |a BCS, The Chartered Institute for IT  |b BCSL  |n 9781780175751 
938 |a BCS, The Chartered Institute for IT  |b BCSL  |n 9781780175744 
994 |a 92  |b IZTAP