Information Security Risk Assessment Toolkit

Practical Assessments through Data Collection and Data Analysis

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Risk Assessment Toolkit by Mark Talabis, Jason Martin, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mark Talabis, Jason Martin ISBN: 9781597499750
Publisher: Elsevier Science Publication: October 17, 2012
Imprint: Syngress Language: English
Author: Mark Talabis, Jason Martin
ISBN: 9781597499750
Publisher: Elsevier Science
Publication: October 17, 2012
Imprint: Syngress
Language: English

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

  • Based on authors’ experiences of real-world assessments, reports, and presentations
  • Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
  • Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

More books from Elsevier Science

Cover of the book Performance, Risk and Competition in the Chinese Banking Industry by Mark Talabis, Jason Martin
Cover of the book Regulating Safety of Traditional and Ethnic Foods by Mark Talabis, Jason Martin
Cover of the book Psychology of Learning and Motivation by Mark Talabis, Jason Martin
Cover of the book Identifying Marine Phytoplankton by Mark Talabis, Jason Martin
Cover of the book Microwave-Assisted Sample Preparation for Trace Element Determination by Mark Talabis, Jason Martin
Cover of the book Principles of Tissue Engineering by Mark Talabis, Jason Martin
Cover of the book Quaternary Glaciations - Extent and Chronology by Mark Talabis, Jason Martin
Cover of the book The Clinician's Guide to Cognitive-Behavioral Therapy for Childhood Obsessive-Compulsive Disorder by Mark Talabis, Jason Martin
Cover of the book Discovery and Development of Neuroprotective Agents from Natural Products by Mark Talabis, Jason Martin
Cover of the book International Edition University Physics by Mark Talabis, Jason Martin
Cover of the book Computer Design of Diffractive Optics by Mark Talabis, Jason Martin
Cover of the book Anticandidal Agents by Mark Talabis, Jason Martin
Cover of the book Brain Machine Interfaces by Mark Talabis, Jason Martin
Cover of the book The Choroid Plexus and Cerebrospinal Fluid by Mark Talabis, Jason Martin
Cover of the book Nonlinear Systems in Heat Transfer by Mark Talabis, Jason Martin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy