Information security risk management for ISO27001/ISO27002:
Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Calder, Alan (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cambridgeshire IT Governance Pub. c2010
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Beschreibung:Includes bibliographical references
Cover13; -- Contents -- Introduction -- Chapter 1: Risk Management -- Risk management: two phases -- Enterprise risk management -- Chapter 2: Risk Assessment Methodologies -- Publicly available risk assessment standards -- Qualitative versus quantitative -- Quantitative risk analysis -- Qualitative risk analysis 8211; the ISO27001 approach -- Other risk assessment methodologies -- Chapter 3: Risk Management Objectives -- Risk acceptance or tolerance -- Information security risk management objectives -- Risk management and PDCA -- Chapter 4: Roles and Responsibilities -- Senior management commitment -- The (lead) risk assessor -- Other roles and responsibilities -- Chapter 5: Risk Assessment Software -- Gap analysis tools -- Vulnerability assessment tools -- Penetration testing -- Risk assessment tools -- Risk assessment tool descriptions -- Chapter 6: Information Security Policy and Scoping -- Information security policy -- Scope of the ISMS --
- Chapter 7: The ISO27001 Risk Assessment -- Overview of the risk assessment process -- Chapter 8: Information Assets -- Assets within the scope -- Grouping of assets -- Asset dependencies -- Asset owners -- Sensitivity classification -- Are vendors assets? -- What about duplicate copies and backups? -- Identification of existing controls -- Chapter 9: Threats and Vulnerabilities -- Threats -- Vulnerabilities -- Technical vulnerabilities -- Chapter 10: Impact and Asset Valuation -- Impacts -- Defining impact -- Estimating impact -- The asset valuation table -- Business, legal and contractual impact values -- Reputation damage -- Chapter 11: Likelihood -- Risk analysis -- Information to support assessments -- Chapter 12: Risk Level -- The risk scale -- Boundary calculations -- Mid-point calculations -- Chapter 13: Risk Treatment and the Selection of Controls -- Types of controls -- Risk assessment and existing controls -- Residual risk -- Risk transfer -- Optimising the solution --
- Chapter 14: The Statement of Applicability -- Drafting the Statement of Applicability -- Chapter 15: The Gap Analysis and Risk Treatment Plan -- Gap analysis -- Risk Treatment Plan -- Chapter 16: Repeating and Reviewing the Risk Assessment -- Appendix 1: Carrying out an ISO27001 Risk Assessment using vsRisk8482; -- Appendix 2: ISO27001 Implementation Resources -- Books by the Same Authors -- ITG Resources
Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software
Beschreibung:1 Online-Ressource (186 p.)
ISBN:1282737066
1849280436
1849280444
9781282737068
9781849280433
9781849280440

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand! Volltext öffnen