Information security risk assessment toolkit practical assessments through data collection and data analysis

In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus a...

Descripción completa

Detalles Bibliográficos
Autor principal: Talabis, Mark Ryan N. (-)
Otros Autores: Martin, Jason L., Wheeler, Evan
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier 2013.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628565806719
Descripción
Sumario:In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Ris
Notas:Description based upon print version of record.
Descripción Física:1 online resource (281 p.)
Bibliografía:Includes bibliographical references and index.
ISBN:9781283705509
9781597499750