The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations. This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin. The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Introduction
The Need for an Information Security Program
Elements of an Information Security Program
Common Core Information Security Practices
Security Risk Assessment
Related Activities
The Need for This Book
Who Is This Book For?
Information Security Risk Assessment Basics
Phase 1: Project Definition
Phase 2: Project Preparation
Phase 3: Data-gathering
Phase 4: Risk Analysis
Phase 5: Risk Mitigation
Phase 6: Risk Reporting and Resolution
Project Definition
Ensuring Project Success
Project Description
Security Risk Assessment Preparation
Introduce the Team
Review Business Mission
Identify Critical Systems
Identify Assets
Identifying Threats
Determine Expected Controls
Data Gathering
Sampling
The RIIOT Method of Data Gathering
Administrative Data Gathering
Threats and Safeguards
The RIIOT Method: Administrative Data Gathering
Technical Data Gathering
Technical Threats and Safeguards
The RIIOT Method: Technical Data Gathering
Physical Data Gathering
Physical Threats and Safeguards
The RIIOT Method: Physical Data Gathering
Security Risk Analysis
Determining Risk
Creating Risk Statements
Team Review of Security Risk Statements
Security Risk Mitigation
Selecting Safeguards
Safeguard Solution Sets
Establishing Risk Parameters
Security Risk Assessment Reporting
Cautions in Reporting
Pointers in Reporting
Report Structure
Document Review Methodology: Create the Report Using
a Top-Down Approach
Assessment Brief
Action Plan
Security Risk Assessment Project Management
Project Planning
Project Tracking
Taking Corrective Measures
Project Status Reporting
Project Conclusion and Wrap-up
Security Risk Assessment Approaches
Quantitative vs. Qualitative Analysis
Tools
Security Risk Assessment Methods
Appendix Relevant Standards and Regulations
GAISP
COBIT
ISO 17799
NIST Handbook
HIPAA: Security
Gramm-Leach-Bliley Act (GLB Act)
Book by Landoll Douglas J Landoll Douglas
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 12,19 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 29,89 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Hardcover. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.9. Codice articolo G0849329981I4N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Hardcover. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.9. Codice articolo G0849329981I4N00
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. 1st Edition. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 5797892-75
Quantità: 1 disponibili
Da: Buchpark, Trebbin, Germania
Condizione: Sehr gut. Zustand: Sehr gut | Seiten: 473 | Sprache: Englisch | Produktart: Bücher. Codice articolo 2273765/202
Quantità: 1 disponibili
Da: Modernes Antiquariat an der Kyll, Lissendorf, Germania
Hardcover. Condizione: Sehr gut. kleine Lagerspuren am Buch, Inhalt einwandfrei und ungelesen 126267 Sprache: Englisch Gewicht in Gramm: 870. Codice articolo 386064
Quantità: 1 disponibili
Da: Basement Seller 101, Cincinnati, OH, U.S.A.
Hardcover. Condizione: New. Codice articolo 200912035
Quantità: 1 disponibili
Da: Basement Seller 101, Cincinnati, OH, U.S.A.
Hardcover. Condizione: Like New. Signed by author. Codice articolo 200912036
Quantità: 1 disponibili
Da: Basement Seller 101, Cincinnati, OH, U.S.A.
Hardcover. Condizione: Like New. Signed by author, MINT condition. Codice articolo 200917019
Quantità: 1 disponibili
Da: Toscana Books, AUSTIN, TX, U.S.A.
Hardcover. Condizione: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Codice articolo Scanned0849329981
Quantità: 1 disponibili
Da: HPB-Red, Dallas, TX, U.S.A.
hardcover. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Codice articolo S_438127019
Quantità: 1 disponibili