Information Security Risk Assessment Toolkit

Practical Assessments through Data Collection and Data Analysis

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Risk Assessment Toolkit by Mark Talabis, Jason Martin, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mark Talabis, Jason Martin ISBN: 9781597499750
Publisher: Elsevier Science Publication: October 17, 2012
Imprint: Syngress Language: English
Author: Mark Talabis, Jason Martin
ISBN: 9781597499750
Publisher: Elsevier Science
Publication: October 17, 2012
Imprint: Syngress
Language: English

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

  • Based on authors’ experiences of real-world assessments, reports, and presentations
  • Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
  • Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

More books from Elsevier Science

Cover of the book Geophysical Data Analysis by Mark Talabis, Jason Martin
Cover of the book Calcium Disorders by Mark Talabis, Jason Martin
Cover of the book Insect Molecular Genetics by Mark Talabis, Jason Martin
Cover of the book Modifying Flavour in Food by Mark Talabis, Jason Martin
Cover of the book Decision Making: Neural and Behavioural Approaches by Mark Talabis, Jason Martin
Cover of the book Singularity and Dynamics on Discontinuous Vector Fields by Mark Talabis, Jason Martin
Cover of the book Cancer Drug Design and Discovery by Mark Talabis, Jason Martin
Cover of the book Oil and Gas Corrosion Prevention by Mark Talabis, Jason Martin
Cover of the book Host Integrity Monitoring Using Osiris and Samhain by Mark Talabis, Jason Martin
Cover of the book Lipidomics and Bioactive Lipids: Specialized Analytical Methods and Lipids in Disease by Mark Talabis, Jason Martin
Cover of the book Neuroanatomy for Medical Students by Mark Talabis, Jason Martin
Cover of the book Advanced Persistent Security by Mark Talabis, Jason Martin
Cover of the book Handbook of the Geometry of Banach Spaces by Mark Talabis, Jason Martin
Cover of the book Gas Chromatography and Mass Spectrometry: A Practical Guide by Mark Talabis, Jason Martin
Cover of the book Darriwilian to Katian (Ordovician) Graptolites from Northwest China by Mark Talabis, Jason Martin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy