𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

✍ Scribed by Mark Talabis, Jason Martin


Publisher
Syngress
Year
2012
Tongue
English
Leaves
263
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Β Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored.Β Β Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.


    • Based on authors' experiences of real-world assessments, reports, and presentations

    • Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment

    • Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment

    ✦ Table of Contents


    Content:
    Front Matter, Pages i-ii
    Copyright, Page iv
    Dedication, Page v
    Acknowledgements, Page xiii
    About the Technical Editor, Page xv
    About the Authors, Page xvii
    Introduction, Page xix
    Chapter 1 - Information Security Risk Assessments, Pages 1-26, Mark Talabis, Jason Martin
    Chapter 2 - Information Security Risk Assessment: A Practical Approach, Pages 27-62, Mark Talabis, Jason Martin
    Chapter 3 - Information Security Risk Assessment: Data Collection, Pages 63-104, Mark Talabis, Jason Martin
    Information Security Risk Assessment: Data Analysis, Pages 105-146, Mark Talabis, Jason Martin
    Information Security Risk Assessment: Risk Assessment, Pages 147-175, Mark Talabis, Jason Martin
    Chapter 6 - Information Security Risk Assessment: Risk Prioritization and Treatment, Pages 177-193, Mark Talabis, Jason Martin
    Chapter 7 - Information Security Risk Assessment: Reporting, Pages 195-231, Mark Talabis, Jason Martin
    Chapter 8 - Information Security Risk Assessment: Maintenance and Wrap Up, Pages 233-250, Mark Talabis, Jason Martin
    Index, Pages 251-258


    πŸ“œ SIMILAR VOLUMES


    Information Security Risk Assessment Too
    ✍ Mark Talabis, Jason Martin πŸ“‚ Library πŸ“… 2012 πŸ› Syngress 🌐 English

    <p>In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus att

    Information Security Risk Assessment Too
    ✍ Mark Talabis, Jason Martin πŸ“‚ Library πŸ“… 2012 πŸ› Syngress 🌐 English

    <p>In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus att

    Data Analytics and Psychometrics: Inform
    ✍ Hong Jiao (editor), Robert W. Lissitz (editor), Anna Van Wie (editor) πŸ“‚ Library πŸ“… 2018 πŸ› Information Age Publishing 🌐 English

    The general theme of this book is to encourage the use of relevant methodology in data mining which is or could be applied to the interplay of education, statistics and computer science to solve psychometric issues and challenges in the new generation of assessments. In addition to item response dat

    Freedom and Information: Assessing Publi
    ✍ Eric Landree, Christopher Paul πŸ“‚ Library πŸ“… 2007 πŸ› Rand Publishing 🌐 English

    Describes a framework to guide assessments of the availability of data regarding U.S. anti- and counterterrorism systems, countermeasures, and defenses for planning attacks on the U.S. air, rail, and sea transportation infrastructure. Overall, the framework is useful for assessing what kind of infor

    Collecting, Managing, and Assessing Data
    ✍ Peter Stopher πŸ“‚ Library πŸ“… 2012 πŸ› Cambridge University Press 🌐 English

    Collecting, Managing, and Assessing Data Using Sample Surveys provides a thorough, step-by-step guide to the design and implementation of surveys. Beginning with a primer on basic statistics, the first half of the book takes readers on a comprehensive tour through the basics of survey design. Topics

    Collecting, Managing, and Assessing Data
    ✍ Peter Stopher πŸ“‚ Library πŸ“… 2012 πŸ› Cambridge University Press 🌐 English

    Collecting, Managing, and Assessing Data Using Sample Surveys provides a thorough, step-by-step guide to the design and implementation of surveys. Beginning with a primer on basic statistics, the first half of the book takes readers on a comprehensive tour through the basics of survey design. Topics