Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, The
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1483 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1483 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-14832009-12-02T09:39:26Z Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, The Landoll, Douglas The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations. This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin. The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations. Introduction The Need for an Information Security Program Elements of an Information Security Program Common Core Information Security Practices Security Risk Assessment Related Activities The Need for This Book Who Is This Book For? Information Security Risk Assessment Basics Phase 1: Project Definition Phase 2: Project Preparation Phase 3: Data-gathering Phase 4: Risk Analysis Phase 5: Risk Mitigation Phase 6: Risk Reporting and Resolution Project Definition Ensuring Project Success Project Description Security Risk Assessment Preparation Introduce the Team Review Business Mission Identify Critical Systems Identify Assets Identifying Threats Determine Expected Controls Data Gathering Sampling The RIIOT Method of Data Gathering Administrative Data Gathering Threats and Safeguards The RIIOT Method: Administrative Data Gathering Technical Data Gathering Technical Threats and Safeguards The RIIOT Method: Technical Data Gathering Physical Data Gathering Physical Threats and Safeguards The RIIOT Method: Physical Data Gathering Security Risk Analysis Determining Risk Creating Risk Statements Team Review of Security Risk Statements Security Risk Mitigation Selecting Safeguards Safeguard Solution Sets Establishing Risk Parameters Security Risk Assessment Reporting Cautions in Reporting Pointers in Reporting Report Structure Document Review Methodology: Create the Report Using a Top-Down Approach Assessment Brief Action Plan Security Risk Assessment Project Management Project Planning Project Tracking Taking Corrective Measures Project Status Reporting Project Conclusion and Wrap-up Security Risk Assessment Approaches Quantitative vs. Qualitative Analysis Tools Security Risk Assessment Methods Appendix Relevant Standards and Regulations GAISP COBIT ISO 17799 NIST Handbook HIPAA: Security Gramm-Leach-Bliley Act (GLB Act) 2009-12-02T09:39:26Z 2009-12-02T09:39:26Z 2005 Book https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1483 en application/rar CRC Press |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations.
This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin.
The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations. |
format |
Book |
author |
Landoll, Douglas |
spellingShingle |
Landoll, Douglas Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, The |
author_facet |
Landoll, Douglas |
author_sort |
Landoll, Douglas |
title |
Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, The |
title_short |
Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, The |
title_full |
Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, The |
title_fullStr |
Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, The |
title_full_unstemmed |
Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, The |
title_sort |
security risk assessment handbook: a complete guide for performing security risk assessments, the |
publisher |
CRC Press |
publishDate |
2009 |
url |
https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1483 |
_version_ |
1819794566312624128 |