Cargando…

Information security risk assessment toolkit : practical assessments through data collection and data analysis /

In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Talabis, Mark Ryan M.
Otros Autores: Martin, Jason
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Syngress, �2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn814380381
003 OCoLC
005 20231117044747.0
006 m o d
007 cr cnu---unuuu
008 121025s2012 ne o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d OCLCF  |d UIU  |d OCLCQ  |d U3W  |d D6H  |d AU@  |d WYU  |d LEAUB  |d OL$  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 9781597497350 
020 |z 1597497355 
035 |a (OCoLC)814380381 
050 4 |a QA76.9.A25  |b T35 2012 
082 0 4 |a 005.8  |2 23 
100 1 |a Talabis, Mark Ryan M. 
245 1 0 |a Information security risk assessment toolkit :  |b practical assessments through data collection and data analysis /  |c Mark Ryan M. Talabis, Jason L. Martin. 
260 |a Amsterdam ;  |a Boston :  |b Syngress,  |c �2012. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment. 
500 |a Includes index. 
500 |a Title from publisher's Web site (ScienceDirect; viewed on Oct. 25, 2012). 
505 0 |a Information security risk assessments -- Information security risk assessment : a practical approach -- Information security risk assessment : data collection -- Information security risk assessment data analysis -- Information security risk assessment : risk assessment -- Information security risk assessment : risk prioritization and treatment -- Information security risk assessment : reporting -- Information security risk assessment : maintenance and wrap up. 
650 0 |a Data protection. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Database security. 
650 6 |a Protection de l'information (Informatique)  |0 (CaQQLa)201-0061151 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a Bases de donn�ees  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0220408 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Data protection  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Database security  |2 fast  |0 (OCoLC)fst00888063 
700 1 |a Martin, Jason. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597497350  |z Texto completo