CRISC certified in risk and information systems control all-in-one exam guide /
A fully updated self-study guide for the industry-standard information technology risk certification, CRISC Written by information security risk experts, this complete self-study system is designed to help you prepare for--and pass--ISACA's CRISC certification exam. CRISC Certified in Risk and...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
2022.
|
Edición: | Second edition. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- About the Authors
- Contents at a Glance
- Contents
- Introduction
- Chapter 1 Governance
- Organizational Governance
- Organizational Strategy, Goals, and Objectives
- Organizational Structure, Roles, and Responsibilities
- Organizational Culture
- Policies and Standards
- Business Processes
- Organizational Assets
- Risk Governance
- Enterprise Risk Management and Risk Management Frameworks
- Three Lines of Defense
- Risk Profile
- Risk Appetite and Risk Tolerance
- Legal, Regulatory, and Contractual Requirements
- Professional Ethics of Risk Management
- Chapter Review
- Quick Review
- Questions
- Answers
- Chapter 2 IT Risk Assessment
- IT Risk Identification
- Risk Events
- Threat Modeling and Threat Landscape
- Vulnerability and Control Deficiency Analysis
- Risk Scenario Development
- IT Risk Analysis and Evaluation
- Risk Assessment Concepts, Standards, and Frameworks
- Risk Assessment Standards and Frameworks
- Risk Ranking
- Risk Ownership
- Risk Register
- Risk Analysis Methodologies
- Business Impact Analysis
- Inherent and Residual Risk
- Miscellaneous Risk Considerations
- Chapter Review
- Quick Review
- Questions
- Answers
- Chapter 3 Risk Response and Reporting
- Risk Response
- Risk and Control Ownership
- Risk Treatment/Risk Response Options
- Third-Party Risk
- Issues, Findings, and Exceptions Management
- Management of Emerging Risk
- Control Design and Implementation
- Control Types and Functions
- Control Standards and Frameworks
- Control Design, Selection, and Analysis
- Control Implementation
- Control Testing and Effectiveness Evaluation
- Risk Monitoring and Reporting
- Risk Treatment Plans
- Data Collection, Aggregation, Analysis, and Validation
- Risk and Control Monitoring Techniques
- Risk and Control Reporting Techniques
- Key Performance Indicators
- Key Risk Indicators
- Key Control Indicators
- Chapter Review
- Quick Review
- Questions
- Answers
- Chapter 4 Information Technology and Security
- Enterprise Architecture
- Platforms
- Software
- Databases
- Operating Systems
- Networks
- Cloud
- Gateways
- Enterprise Architecture Frameworks
- Implementing a Security Architecture
- IT Operations Management
- Project Management
- Business Continuity and Disaster Recovery Management
- Business Impact Analysis
- Recovery Objectives
- Recovery Strategies
- Plan Testing
- Resilience and Risk Factors
- Data Lifecycle Management
- Standards and Guidelines
- Data Retention Policies
- Hardware Disposal and Data Destruction Policies
- Systems Development Life Cycle
- Planning
- Requirements
- Design
- Development
- Testing
- Implementation and Operation
- Disposal
- SDLC Risks
- Emerging Technologies
- Information Security Concepts, Frameworks, and Standards
- Confidentiality, Integrity, and Availability