The information systems security (InfoSec) profession remains one of the fastest growing professions in the world today. With the advent of the Internet and its use as a method of conducting business, even more emphasis is being placed on InfoSec. However, there is an expanded field of threats that
Risk management for computer security : Protecting your network and information assets
โ Scribed by Andy Jones; Debi Ashenden
- Publisher
- Elsevier Butterworth-Heinemann
- Year
- 2005
- Tongue
- English
- Leaves
- 297
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program.
โฆ Table of Contents
Content: Cover --
Copyright Page --
Contents --
Foreword --
Preface --
Acknowledgments --
About the Authors --
Section I: An Introduction to Risk Management --
Chapter 1. Introduction to the Theories of Risk Management --
Chapter 2. The Changing Environment --
Chapter 3. The Art of Managing Risks --
Section II: The Threat Assessment Process --
Chapter 4. Threat Assessment and Its Input to Risk Assessment --
Chapter 5. Threat Assessment Method --
Chapter 6. Example Threat Assessment --
Section III: Vulnerability Issues --
Chapter 7. Operating System Vulnerabilities --
Chapter 8. Application Vulnerabilities --
Chapter 9. Public Domain or Commercial Off-the-Shelf Software? --
Chapter 10. Connectivity and Dependence --
Section IV: The Risk Process --
Chapter 11. What Is Risk Assessment? --
Chapter 12. Risk Analysis --
Chapter 13. Who Is Responsible? --
Section V: Tools and Types of Risk Assessment --
Chapter 14. Qualitative and Quantitative Risk Assessment --
Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management --
Chapter 16. Tools and Techniques --
Chapter 17. Integrated Risk Management --
Section VI: Future Directions --
Chapter 18. The Future of Risk Management --
Index --
Last Page.
Abstract: Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program
๐ SIMILAR VOLUMES
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from lo
<p><em>Managing Risk and Information Security: Protect to Enable</em>, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must s
This ApressOpen book describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing a
This ApressOpen book describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing a