Information security risk assessment toolkit practical assessments through data collection and data analysis

In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus a...

Full description

Bibliographic Details
Main Author: Talabis, Mark Ryan N. (-)
Other Authors: Martin, Jason L., Wheeler, Evan
Format: eBook
Language:Inglés
Published: Amsterdam ; Boston : Elsevier 2013.
Edition:1st edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628565806719
Description
Summary:In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Ris
Item Description:Description based upon print version of record.
Physical Description:1 online resource (281 p.)
Bibliography:Includes bibliographical references and index.
ISBN:9781283705509
9781597499750