Security risk management: building an information security risk management program from the ground up
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
c2011
|
Schlagworte: | |
Online-Zugang: | FUBA1 FAW01 FLA01 Volltext |
Beschreibung: | Includes bibliographical references and index The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program |
Beschreibung: | 1 Online-Ressource (xxi, 340 p.) |
ISBN: | 9781597496155 1597496154 9781597496162 1597496162 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314271 | ||
003 | DE-604 | ||
005 | 20180123 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597496155 |c electronic bk. |9 978-1-59749-615-5 | ||
020 | |a 1597496154 |c electronic bk. |9 1-59749-615-4 | ||
020 | |a 9781597496162 |c electronic bk. |9 978-1-59749-616-2 | ||
020 | |a 1597496162 |c electronic bk. |9 1-59749-616-2 | ||
035 | |a (ZDB-4-EBA)ocn722800242 | ||
035 | |a (ZDB-4-ITC)ocn722800242 | ||
035 | |a (OCoLC)722800242 | ||
035 | |a (DE-599)BVBBV042314271 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-188 | ||
082 | 0 | |a 658.15/5 |2 22 | |
100 | 1 | |a Wheeler, Evan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security risk management |b building an information security risk management program from the ground up |c Evan Wheeler |
264 | 1 | |a Waltham, MA |b Syngress |c c2011 | |
300 | |a 1 Online-Ressource (xxi, 340 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program | ||
650 | 7 | |a BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management |2 bisacsh | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Risk management | |
650 | 4 | |a Risk management |x Security measures | |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597496155 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-4-EBA |a ZDB-33-EBS |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027751262 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597496155 |l FUBA1 |p ZDB-33-ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597496155 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597496155 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152907245813760 |
---|---|
any_adam_object | |
author | Wheeler, Evan |
author_facet | Wheeler, Evan |
author_role | aut |
author_sort | Wheeler, Evan |
author_variant | e w ew |
building | Verbundindex |
bvnumber | BV042314271 |
collection | ZDB-33-ESD ZDB-4-EBA ZDB-33-EBS ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn722800242 (ZDB-4-ITC)ocn722800242 (OCoLC)722800242 (DE-599)BVBBV042314271 |
dewey-full | 658.15/5 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.15/5 |
dewey-search | 658.15/5 |
dewey-sort | 3658.15 15 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03474nmm a2200529zc 4500</leader><controlfield tag="001">BV042314271</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180123 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496155</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-615-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496154</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-615-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496162</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-616-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496162</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-616-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn722800242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn722800242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)722800242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314271</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.15/5</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wheeler, Evan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security risk management</subfield><subfield code="b">building an information security risk management program from the ground up</subfield><subfield code="c">Evan Wheeler</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 340 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597496155</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-33-EBS</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751262</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597496155</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597496155</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597496155</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042314271 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9781597496155 1597496154 9781597496162 1597496162 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751262 |
oclc_num | 722800242 |
open_access_boolean | |
owner | DE-1046 DE-188 |
owner_facet | DE-1046 DE-188 |
physical | 1 Online-Ressource (xxi, 340 p.) |
psigel | ZDB-33-ESD ZDB-4-EBA ZDB-33-EBS ZDB-4-ITC ZDB-33-ESD FAW_PDA_ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress |
record_format | marc |
spelling | Wheeler, Evan Verfasser aut Security risk management building an information security risk management program from the ground up Evan Wheeler Waltham, MA Syngress c2011 1 Online-Ressource (xxi, 340 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management bisacsh Wirtschaft Risk management Risk management Security measures Risikomanagement (DE-588)4121590-4 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 s Risikomanagement (DE-588)4121590-4 s 1\p DE-604 http://www.sciencedirect.com/science/book/9781597496155 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Wheeler, Evan Security risk management building an information security risk management program from the ground up BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management bisacsh Wirtschaft Risk management Risk management Security measures Risikomanagement (DE-588)4121590-4 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4121590-4 (DE-588)4061963-1 |
title | Security risk management building an information security risk management program from the ground up |
title_auth | Security risk management building an information security risk management program from the ground up |
title_exact_search | Security risk management building an information security risk management program from the ground up |
title_full | Security risk management building an information security risk management program from the ground up Evan Wheeler |
title_fullStr | Security risk management building an information security risk management program from the ground up Evan Wheeler |
title_full_unstemmed | Security risk management building an information security risk management program from the ground up Evan Wheeler |
title_short | Security risk management |
title_sort | security risk management building an information security risk management program from the ground up |
title_sub | building an information security risk management program from the ground up |
topic | BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management bisacsh Wirtschaft Risk management Risk management Security measures Risikomanagement (DE-588)4121590-4 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management Wirtschaft Risk management Risk management Security measures Risikomanagement Unternehmen |
url | http://www.sciencedirect.com/science/book/9781597496155 |
work_keys_str_mv | AT wheelerevan securityriskmanagementbuildinganinformationsecurityriskmanagementprogramfromthegroundup |