Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

by Mark Talabis, Jason Martin
     
 

View All Available Formats & Editions

ISBN-10: 1597497355

ISBN-13: 9781597497350

Pub. Date: 11/09/2012

Publisher: Elsevier Science

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and

Overview

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored.Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

    • Based on authors’ experiences of real-world assessments, reports, and presentations
    • Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
    • Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment

    Product Details

    ISBN-13:
    9781597497350
    Publisher:
    Elsevier Science
    Publication date:
    11/09/2012
    Pages:
    272
    Sales rank:
    1,165,330
    Product dimensions:
    7.50(w) x 9.10(h) x 0.90(d)

    Table of Contents

    Chapter 1: Information Security Risk Assessments

    Chapter 2: A Practical Approach

    Chapter 3: Data Collection

    Chapter 4: Data Analysis

    Chapter 5: Risk Assessment

    Chapter 6: Risk Prioritization and Treatment

    Chapter 7: Reporting

    Chapter 8: Maintenance and Wrap Up

    Customer Reviews

    Average Review:

    Write a Review

    and post it to your social network

         

    Most Helpful Customer Reviews

    See all customer reviews >