Information Security Risk Assessment Toolkit

Practical Assessments through Data Collection and Data Analysis

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Risk Assessment Toolkit by Mark Talabis, Jason Martin, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mark Talabis, Jason Martin ISBN: 9781597499750
Publisher: Elsevier Science Publication: October 17, 2012
Imprint: Syngress Language: English
Author: Mark Talabis, Jason Martin
ISBN: 9781597499750
Publisher: Elsevier Science
Publication: October 17, 2012
Imprint: Syngress
Language: English

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

  • Based on authors’ experiences of real-world assessments, reports, and presentations
  • Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
  • Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

More books from Elsevier Science

Cover of the book Introductory Differential Equations by Mark Talabis, Jason Martin
Cover of the book Smart Polymers and their Applications by Mark Talabis, Jason Martin
Cover of the book Microbial Decontamination in the Food Industry by Mark Talabis, Jason Martin
Cover of the book Assessing Vendors by Mark Talabis, Jason Martin
Cover of the book Data Analytics for Intelligent Transportation Systems by Mark Talabis, Jason Martin
Cover of the book Food Hygiene and Toxicology in Ready-to-Eat Foods by Mark Talabis, Jason Martin
Cover of the book Advances in Immunology by Mark Talabis, Jason Martin
Cover of the book Global Clinical Trials by Mark Talabis, Jason Martin
Cover of the book Handbook of Medical Textiles by Mark Talabis, Jason Martin
Cover of the book Disease-Modifying Targets in Neurodegenerative Disorders by Mark Talabis, Jason Martin
Cover of the book Thermal Inertia in Energy Efficient Building Envelopes by Mark Talabis, Jason Martin
Cover of the book Supercritical Fluids as Solvents and Reaction Media by Mark Talabis, Jason Martin
Cover of the book The Corresponding-States Principle and its Practice by Mark Talabis, Jason Martin
Cover of the book Nanotechnology Environmental Health and Safety by Mark Talabis, Jason Martin
Cover of the book The System Designer's Guide to VHDL-AMS by Mark Talabis, Jason Martin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy