Information Security Risk Assessment Toolkit

Practical Assessments through Data Collection and Data Analysis

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Risk Assessment Toolkit by Mark Talabis, Jason Martin, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mark Talabis, Jason Martin ISBN: 9781597499750
Publisher: Elsevier Science Publication: October 17, 2012
Imprint: Syngress Language: English
Author: Mark Talabis, Jason Martin
ISBN: 9781597499750
Publisher: Elsevier Science
Publication: October 17, 2012
Imprint: Syngress
Language: English

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

  • Based on authors’ experiences of real-world assessments, reports, and presentations
  • Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
  • Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

More books from Elsevier Science

Cover of the book Basic AC Circuits by Mark Talabis, Jason Martin
Cover of the book The Science of Crime Scenes by Mark Talabis, Jason Martin
Cover of the book Sialic Acids, Part I: Historical Background and Development and Chemical Synthesis by Mark Talabis, Jason Martin
Cover of the book Food Protected Designation of Origin by Mark Talabis, Jason Martin
Cover of the book Maritime Security by Mark Talabis, Jason Martin
Cover of the book Encyclopedia of Applied Ethics by Mark Talabis, Jason Martin
Cover of the book Surface Production Operations: Vol 2: Design of Gas-Handling Systems and Facilities by Mark Talabis, Jason Martin
Cover of the book Cyber Security and IT Infrastructure Protection by Mark Talabis, Jason Martin
Cover of the book The Ecology and Biology of Nephrops Norvegicus by Mark Talabis, Jason Martin
Cover of the book Modern Techniques for Food Authentication by Mark Talabis, Jason Martin
Cover of the book Smart Buildings by Mark Talabis, Jason Martin
Cover of the book Principles of the Magnetic Methods in Geophysics by Mark Talabis, Jason Martin
Cover of the book The Mitochondrion in Aging and Disease by Mark Talabis, Jason Martin
Cover of the book G Protein-Coupled Receptors, Part B by Mark Talabis, Jason Martin
Cover of the book Introduction to Emergency Management by Mark Talabis, Jason Martin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy