×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis
     

Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

by Mark Talabis, Jason Martin
 

See All Formats & Editions

ISBN-10: 1597497355

ISBN-13: 9781597497350

Pub. Date: 11/09/2012

Publisher: Elsevier Science

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and

Overview

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkitgives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

  • Based on authors’ experiences of real-world assessments, reports, and presentations
  • Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
  • Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment

Product Details

ISBN-13:
9781597497350
Publisher:
Elsevier Science
Publication date:
11/09/2012
Pages:
272
Sales rank:
623,916
Product dimensions:
7.50(w) x 9.10(h) x 0.90(d)

Table of Contents

Chapter 1: Information Security Risk Assessments

Chapter 2: A Practical Approach

Chapter 3: Data Collection

Chapter 4: Data Analysis

Chapter 5: Risk Assessment

Chapter 6: Risk Prioritization and Treatment

Chapter 7: Reporting

Chapter 8: Maintenance and Wrap Up

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews