Information Risk Management: a practitioner's guide
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
BCS
2014
|
Schlagworte: | |
Online-Zugang: | FLA01 |
Beschreibung: | CIP data; resource not viewed Print version record |
Beschreibung: | 1 online resource (210 pages) |
ISBN: | 9781780172668 1780172664 9781780172675 1780172672 9781780172682 1780172680 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046101414 | ||
003 | DE-604 | ||
005 | 20220221 | ||
007 | cr|uuu---uuuuu | ||
008 | 190813s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781780172668 |9 978-1-78017-266-8 | ||
020 | |a 1780172664 |9 1-78017-266-4 | ||
020 | |a 9781780172675 |9 978-1-78017-267-5 | ||
020 | |a 1780172672 |9 1-78017-267-2 | ||
020 | |a 9781780172682 |9 978-1-78017-268-2 | ||
020 | |a 1780172680 |9 1-78017-268-0 | ||
035 | |a (ZDB-4-EBU)ocn897450217 | ||
035 | |a (OCoLC)897450217 | ||
035 | |a (DE-599)BVBBV046101414 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.4038 |2 23 | |
100 | 1 | |a Sutton, David |e Verfasser |0 (DE-588)1252285892 |4 aut | |
245 | 1 | 0 | |a Information Risk Management |b a practitioner's guide |c David Sutton |
264 | 1 | |a London |b BCS |c 2014 | |
300 | |a 1 online resource (210 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a CIP data; resource not viewed | ||
500 | |a Print version record | ||
505 | 8 | |a This book provides a practical guide to implementing an information risk management process. The author takes you logically through the steps required to identify, assess and manage information risks within an organisation. Each step is explained clearly, supported by several generic examples, such as examples of threats and vulnerabilities, as well as the types of controls to treat risk. Ways of presenting the risks, as well as supporting business cases, are also discussed. Other topics include: coverage of the CESG scheme, HMG security-related documents, such as the security policy framework and UK Government security classification scheme, typical threats and hazards, typical vulnerabilities, risk controls, methodologies and tools, and templates. There are references throughout to any appropriate standards, such as ISO27001 and ISO27005. -- | |
650 | 7 | |a BUSINESS & ECONOMICS / Industrial Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management Science |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Behavior |2 bisacsh | |
650 | 7 | |a Information technology / Management |2 fast | |
650 | 7 | |a Risk management |2 fast | |
650 | 4 | |a Information technology |x Management |a Risk management | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Sutton, David |t Information risk management |z 9781780172675 |
912 | |a ZDB-4-EBU | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031482191 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=829098 |l FLA01 |p ZDB-4-EBU |q FLA_PDA_EBU |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180408932237312 |
---|---|
any_adam_object | |
author | Sutton, David |
author_GND | (DE-588)1252285892 |
author_facet | Sutton, David |
author_role | aut |
author_sort | Sutton, David |
author_variant | d s ds |
building | Verbundindex |
bvnumber | BV046101414 |
collection | ZDB-4-EBU |
contents | This book provides a practical guide to implementing an information risk management process. The author takes you logically through the steps required to identify, assess and manage information risks within an organisation. Each step is explained clearly, supported by several generic examples, such as examples of threats and vulnerabilities, as well as the types of controls to treat risk. Ways of presenting the risks, as well as supporting business cases, are also discussed. Other topics include: coverage of the CESG scheme, HMG security-related documents, such as the security policy framework and UK Government security classification scheme, typical threats and hazards, typical vulnerabilities, risk controls, methodologies and tools, and templates. There are references throughout to any appropriate standards, such as ISO27001 and ISO27005. -- |
ctrlnum | (ZDB-4-EBU)ocn897450217 (OCoLC)897450217 (DE-599)BVBBV046101414 |
dewey-full | 658.4038 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4038 |
dewey-search | 658.4038 |
dewey-sort | 3658.4038 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02689nmm a2200481zc 4500</leader><controlfield tag="001">BV046101414</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220221 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190813s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780172668</subfield><subfield code="9">978-1-78017-266-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1780172664</subfield><subfield code="9">1-78017-266-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780172675</subfield><subfield code="9">978-1-78017-267-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1780172672</subfield><subfield code="9">1-78017-267-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780172682</subfield><subfield code="9">978-1-78017-268-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1780172680</subfield><subfield code="9">1-78017-268-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBU)ocn897450217</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)897450217</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046101414</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4038</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sutton, David</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1252285892</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Risk Management</subfield><subfield code="b">a practitioner's guide</subfield><subfield code="c">David Sutton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">BCS</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (210 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">CIP data; resource not viewed</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This book provides a practical guide to implementing an information risk management process. The author takes you logically through the steps required to identify, assess and manage information risks within an organisation. Each step is explained clearly, supported by several generic examples, such as examples of threats and vulnerabilities, as well as the types of controls to treat risk. Ways of presenting the risks, as well as supporting business cases, are also discussed. Other topics include: coverage of the CESG scheme, HMG security-related documents, such as the security policy framework and UK Government security classification scheme, typical threats and hazards, typical vulnerabilities, risk controls, methodologies and tools, and templates. There are references throughout to any appropriate standards, such as ISO27001 and ISO27005. --</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Industrial Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Behavior</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Risk management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield><subfield code="a">Risk management</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Sutton, David</subfield><subfield code="t">Information risk management</subfield><subfield code="z">9781780172675</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031482191</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=829098</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FLA_PDA_EBU</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046101414 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:18Z |
institution | BVB |
isbn | 9781780172668 1780172664 9781780172675 1780172672 9781780172682 1780172680 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031482191 |
oclc_num | 897450217 |
open_access_boolean | |
physical | 1 online resource (210 pages) |
psigel | ZDB-4-EBU ZDB-4-EBU FLA_PDA_EBU |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | BCS |
record_format | marc |
spelling | Sutton, David Verfasser (DE-588)1252285892 aut Information Risk Management a practitioner's guide David Sutton London BCS 2014 1 online resource (210 pages) txt rdacontent c rdamedia cr rdacarrier CIP data; resource not viewed Print version record This book provides a practical guide to implementing an information risk management process. The author takes you logically through the steps required to identify, assess and manage information risks within an organisation. Each step is explained clearly, supported by several generic examples, such as examples of threats and vulnerabilities, as well as the types of controls to treat risk. Ways of presenting the risks, as well as supporting business cases, are also discussed. Other topics include: coverage of the CESG scheme, HMG security-related documents, such as the security policy framework and UK Government security classification scheme, typical threats and hazards, typical vulnerabilities, risk controls, methodologies and tools, and templates. There are references throughout to any appropriate standards, such as ISO27001 and ISO27005. -- BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Information technology / Management fast Risk management fast Information technology Management Risk management Erscheint auch als Druck-Ausgabe Sutton, David Information risk management 9781780172675 |
spellingShingle | Sutton, David Information Risk Management a practitioner's guide This book provides a practical guide to implementing an information risk management process. The author takes you logically through the steps required to identify, assess and manage information risks within an organisation. Each step is explained clearly, supported by several generic examples, such as examples of threats and vulnerabilities, as well as the types of controls to treat risk. Ways of presenting the risks, as well as supporting business cases, are also discussed. Other topics include: coverage of the CESG scheme, HMG security-related documents, such as the security policy framework and UK Government security classification scheme, typical threats and hazards, typical vulnerabilities, risk controls, methodologies and tools, and templates. There are references throughout to any appropriate standards, such as ISO27001 and ISO27005. -- BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Information technology / Management fast Risk management fast Information technology Management Risk management |
title | Information Risk Management a practitioner's guide |
title_auth | Information Risk Management a practitioner's guide |
title_exact_search | Information Risk Management a practitioner's guide |
title_full | Information Risk Management a practitioner's guide David Sutton |
title_fullStr | Information Risk Management a practitioner's guide David Sutton |
title_full_unstemmed | Information Risk Management a practitioner's guide David Sutton |
title_short | Information Risk Management |
title_sort | information risk management a practitioner s guide |
title_sub | a practitioner's guide |
topic | BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Information technology / Management fast Risk management fast Information technology Management Risk management |
topic_facet | BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior Information technology / Management Risk management Information technology Management Risk management |
work_keys_str_mv | AT suttondavid informationriskmanagementapractitionersguide |