Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbo
Information Risk Management, Second edition
β Scribed by David Sutton
- Publisher
- BCS, The Chartered Institute for IT
- Year
- 2021
- Tongue
- English
- Leaves
- 240
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline.
β¦ Table of Contents
Cover
CONTENTS
LIST OF FIGURES AND TABLES
AUTHOR
OTHER WORKS BY THE AUTHOR
ACKNOWLEDGEMENTS
ABBREVIATIONS
PREFACE
1. THE NEED FOR INFORMATION RISK MANAGEMENT
WHAT IS INFORMATION?
WHO SHOULD USE INFORMATION RISK MANAGEMENT?
THE LEGAL FRAMEWORK
THE CONTEXT OF RISK IN THE ORGANISATION
HOT TOPICS TO CONSIDER IN INFORMATION RISK MANAGEMENT
THE BENEFITS OF TAKING ACCOUNT OF INFORMATION RISK
OVERVIEW OF THE INFORMATION RISK MANAGEMENT PROCESS
SUMMARY
2. REVIEW OF INFORMATION SECURITY FUNDAMENTALS
INFORMATION CLASSIFICATION
PLAN-DO-CHECK-ACT
SUMMARY
3. THE INFORMATION RISK MANAGEMENT PROGRAMME
GOALS, SCOPE AND OBJECTIVES
ROLES AND RESPONSIBILITIES
GOVERNANCE OF THE RISK MANAGEMENT PROGRAMME
INFORMATION RISK MANAGEMENT CRITERIA
SUMMARY
4. RISK IDENTIFICATION
THE RISK IDENTIFICATION PROCESS
THE APPROACH TO RISK IDENTIFICATION
IMPACT ASSESSMENT
SUMMARY
5. THREAT AND VULNERABILITY ASSESSMENT
CONDUCTING THREAT ASSESSMENTS
CONDUCTING VULNERABILITY ASSESSMENTS
IDENTIFICATION OF EXISTING CONTROLS
SUMMARY
6. RISK ANALYSIS AND RISK EVALUATION
ASSESSMENT OF LIKELIHOOD
RISK ANALYSIS
RISK EVALUATION
SUMMARY
7. RISK TREATMENT
STRATEGIC RISK OPTIONS
TACTICAL RISK MANAGEMENT CONTROLS
OPERATIONAL RISK MANAGEMENT CONTROLS
EXAMPLES OF CRITICAL CONTROLS AND CONTROL CATEGORIES
SUMMARY
8. RISK REPORTING AND PRESENTATION
BUSINESS CASES
RISK TREATMENT DECISION-MAKING
RISK TREATMENT PLANNING AND IMPLEMENTATION
BUSINESS CONTINUITY AND DISASTER RECOVERY
DISASTER RECOVERY FAILOVER TESTING
SUMMARY
9. COMMUNICATION, CONSULTATION, MONITORING AND REVIEW
SKILLS REQUIRED FOR AN INFORMATION RISK PROGRAMME MANAGER
COMMUNICATION
CONSULTATION
RISK REVIEWS AND MONITORING
SUMMARY
10. THE NCSC CERTIFIED PROFESSIONAL SCHEME
SFIA
THE CIISEC SKILLS FRAMEWORK
SUMMARY
11. HMG SECURITY-RELATED DOCUMENTS
HMG SECURITY POLICY FRAMEWORK
THE NATIONAL SECURITY STRATEGY
CONTEST, THE UNITED KINGDOMβS STRATEGY FOR COUNTERING TERRORISM
THE MINIMUM CYBER SECURITY STANDARD
THE UK CYBER SECURITY STRATEGY 2016β2021
UK GOVERNMENT SECURITY CLASSIFICATIONS
SUMMARY
APPENDIX A β TAXONOMIES AND DESCRIPTIONS
INFORMATION RISK
TYPICAL IMPACTS OR CONSEQUENCES
APPENDIX B β TYPICAL THREATS AND HAZARDS
MALICIOUS INTRUSION (HACKING)
ENVIRONMENTAL THREATS
ERRORS AND FAILURES
SOCIAL ENGINEERING
MISUSE AND ABUSE
PHYSICAL THREATS
MALWARE
APPENDIX C β TYPICAL VULNERABILITIES
ACCESS CONTROL
POOR PROCEDURES
PHYSICAL AND ENVIRONMENTAL SECURITY
COMMUNICATIONS AND OPERATIONS MANAGEMENT
PEOPLE-RELATED SECURITY FAILURES
APPENDIX D β INFORMATION RISK CONTROLS
STRATEGIC CONTROLS
TACTICAL CONTROLS
OPERATIONAL CONTROLS
THE CENTRE FOR INTERNET SECURITY CONTROLS VERSION 8
ISO/IEC 27001:2017 CONTROLS
NIST SPECIAL PUBLICATION 800-53 REVISION 5
APPENDIX E β METHODOLOGIES, GUIDELINES AND TOOLS
METHODOLOGIES
OTHER GUIDELINES AND TOOLS
APPENDIX F β TEMPLATES
APPENDIX G β HMG CYBERSECURITY GUIDELINES
HMG CYBER ESSENTIALS SCHEME
10 STEPS TO CYBER SECURITY
APPENDIX H β REFERENCES AND FURTHER READING
PRIMARY UK LEGISLATION
GOOD PRACTICE GUIDELINES
OTHER REFERENCE MATERIAL
NCSC CERTIFIED PROFESSIONAL SCHEME
OTHER UK GOVERNMENT PUBLICATIONS
RISK MANAGEMENT METHODOLOGIES
UK AND INTERNATIONAL STANDARDS
APPENDIX I β DEFINITIONS, STANDARDS AND GLOSSARY OF TERMS
DEFINITIONS AND GLOSSARY OF TERMS
INFORMATION RISK MANAGEMENT STANDARDS
INDEX
Back cover
π SIMILAR VOLUMES
The book analyzes, compares, and contrasts tools and techniques used in risk management at corporate, strategic business and project level and develops a risk management mechanism for the sequencing of risk assessment through corporate, strategic and project stages of an investment in order to meet
<p><i>Managing Information Security</i> offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vu
<p><i>Managing Information Security</i> offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vu
Having worked on several risk management projects on Wall Street for years, I must admit that this is the best and most comprehensive book on the topic. It covers all the main areas of risk management (market, credit, operational) and saves you countless hours of looking for definitions and derivati
A comprehensive reference and training guide for financial risk management <P>Risk professionals looking to earn the Financial Risk Manager (FRMβ’) certification, corporate training programs, professors, and graduate students all rely on one book for the most comprehensive and up-to-date informa