𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Managing Information Risks: Threats, Vulnerabilities, and Responses

✍ Scribed by Saffady, William


Publisher
Rowman & Littlefield Publishers
Year
2021
Tongue
English
Leaves
257
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Managing Information Risks: Threats, Vulnerabilities, and Responses identifies and categorizes risks related to creation, collection, storage, retention, retrieval, disclosure and ownership of information in organizations of all types and sizes. It is intended for risk managers, information governance specialists, compliance officers, attorneys, records managers, archivists, and other decision-makers, managers, and analysts who are responsible for risk management initiatives related to their organizations’ information assets.

An opening chapter defines and discusses risk terminology and concepts that are essential for understanding, assessing, and controlling information risk. Subsequent chapters provide detailed explanations of specific threats to an organization’s information assets, an assessment of vulnerabilities that the threats can exploit, and a review of available options to address the threats and their associated vulnerabilities. Applicable laws, regulations, and standards are cited at appropriate points in the text. Each chapter includes extensive endnotes that support specific points and provide suggestions for further reading.

While the book is grounded in scholarship, the treatment is practical rather than theoretical. Each chapter focuses on knowledge and recommendations that readers can use to:

heighten risk awareness within their organizations,
identify threats and their associated consequences,
assess vulnerabilities,
evaluate risk mitigation options,
define risk-related responsibilities, and
align information-related initiatives and activities with their organizations’ risk management strategies and policies.

Compared to other works, this book deals with a broader range of information risks and draws on ideas from a greater variety of disciplines, including business process management, law, financial analysis, records management, information science, and archival administration. Most books on this topic associate information risk with digital data, information technology, and cyber security. This book covers risks to information of any type in any format, including paper and photographic records as well as digital content.

✦ Table of Contents


Contents
Preface
1 Risk Terms and Concepts
2 Creation and Collection of Information
3 Loss of Information
4 Retention of Information
5 Retrieval and Disclosure of Information
6 Ownership of Information
Index
About the Author

✦ Subjects


Managing Information Risks, Threats, Vulnerabilities, and Responses


πŸ“œ SIMILAR VOLUMES


Managing Information Risks: Threats, Vul
✍ Saffady, William πŸ“‚ Library πŸ“… 2012 πŸ› Rowman & Littlefield Publishers 🌐 English

Managing Information Risks: Threats, Vulnerabilities, and Responses identifies and categorizes risks related to creation, collection, storage, retention, retrieval, disclosure and ownership of information in organizations of all types and sizes. It is intended for risk managers, information governan

Finance and Security: Global Vulnerabili
✍ Martin S. Navias πŸ“‚ Library πŸ“… 2019 πŸ› Hurst 🌐 English

The global financial sector is increasingly vulnerable to penetration by criminal money-launderers, financiers of terrorism, and proliferators of weapons of mass destruction. At the same time, it offers instruments that can be usefully employed to pursue foreign and security policy objectives. It is

Vulnerability, Uncertainty, and Risk: An
✍ Bilal M. Ayyub πŸ“‚ Library πŸ“… 2011 πŸ› American Society of Civil Engineers 🌐 English

Proceedings of the International Conference on Vulnerability and Risk Analysis and Management (ICVRAM 2011) and the International Symposium on Uncertainty Modeling and Analysis (ISUMA 2011), held in Hyattsville, Maryland, April 11-13, 2011. Sponsored by the Council on Disaster Risk Management of ASC

Effective Vulnerability Management: Mana
✍ Chris Hughes, Nikki Robinson πŸ“‚ Library πŸ“… 2024 πŸ› Wiley 🌐 English

<p><span>Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management</span></p><p><span>Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are th

Effective Vulnerability Management: Mana
✍ Chris Hughes, Nikki Robinson πŸ“‚ Library πŸ“… 2024 πŸ› Wiley 🌐 English

<p><span>Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management</span></p><p><span>Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are th