Information Security Risk Assessment Toolkit

Practical Assessments through Data Collection and Data Analysis

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Risk Assessment Toolkit by Mark Talabis, Jason Martin, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mark Talabis, Jason Martin ISBN: 9781597499750
Publisher: Elsevier Science Publication: October 17, 2012
Imprint: Syngress Language: English
Author: Mark Talabis, Jason Martin
ISBN: 9781597499750
Publisher: Elsevier Science
Publication: October 17, 2012
Imprint: Syngress
Language: English

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

  • Based on authors’ experiences of real-world assessments, reports, and presentations
  • Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
  • Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

More books from Elsevier Science

Cover of the book Rehabilitation Robotics by Mark Talabis, Jason Martin
Cover of the book Nanomaterials in Tissue Engineering by Mark Talabis, Jason Martin
Cover of the book Wireless Communications Over Rapidly Time-Varying Channels by Mark Talabis, Jason Martin
Cover of the book Kinetics of Inorganic Reactions by Mark Talabis, Jason Martin
Cover of the book Determining Mycotoxins and Mycotoxigenic Fungi in Food and Feed by Mark Talabis, Jason Martin
Cover of the book Molecular Microbial Diagnostic Methods by Mark Talabis, Jason Martin
Cover of the book Nature-Inspired Optimization Algorithms by Mark Talabis, Jason Martin
Cover of the book Subsea Pipelines and Risers by Mark Talabis, Jason Martin
Cover of the book Stochastic Analysis of Mixed Fractional Gaussian Processes by Mark Talabis, Jason Martin
Cover of the book Indus River Basin by Mark Talabis, Jason Martin
Cover of the book Stress Testing and Risk Integration in Banks by Mark Talabis, Jason Martin
Cover of the book Key Advances in Clinical Informatics by Mark Talabis, Jason Martin
Cover of the book Consciousness and Cognition by Mark Talabis, Jason Martin
Cover of the book Conjugate Addition Reactions in Organic Synthesis by Mark Talabis, Jason Martin
Cover of the book Mesoscale Modeling in Chemical Engineering Part I by Mark Talabis, Jason Martin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy