Security risk management: building an information security risk management program from the ground up
The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix s...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
© 2011
|
Schriftenreihe: | ITPro
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xxi, 340 pages) |
ISBN: | 9781597496155 1597496154 9781597496162 1597496162 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125591 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597496155 |9 978-1-59749-615-5 | ||
020 | |a 1597496154 |9 1-59749-615-4 | ||
020 | |a 9781597496162 |9 978-1-59749-616-2 | ||
020 | |a 1597496162 |9 1-59749-616-2 | ||
035 | |a (ZDB-33-ESD)ocn722800242 | ||
035 | |a (OCoLC)722800242 | ||
035 | |a (DE-599)BVBBV046125591 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.15/5 |2 22 | |
100 | 1 | |a Wheeler, Evan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security risk management |b building an information security risk management program from the ground up |c Evan Wheeler |
264 | 1 | |a Waltham, MA |b Syngress |c © 2011 | |
300 | |a 1 online resource (xxi, 340 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a ITPro | |
500 | |a Includes bibliographical references and index | ||
520 | |a The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program | ||
650 | 7 | |a BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management |2 bisacsh | |
650 | 7 | |a Risk management |2 fast | |
650 | 4 | |a Risk management | |
650 | 4 | |a Risk management |x Security measures | |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597496155 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506045 | ||
347 | |a data file |2 rda | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597496155 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180444869033984 |
---|---|
any_adam_object | |
author | Wheeler, Evan |
author_facet | Wheeler, Evan |
author_role | aut |
author_sort | Wheeler, Evan |
author_variant | e w ew |
building | Verbundindex |
bvnumber | BV046125591 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn722800242 (OCoLC)722800242 (DE-599)BVBBV046125591 |
dewey-full | 658.15/5 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.15/5 |
dewey-search | 658.15/5 |
dewey-sort | 3658.15 15 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03141nmm a2200505zc 4500</leader><controlfield tag="001">BV046125591</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496155</subfield><subfield code="9">978-1-59749-615-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496154</subfield><subfield code="9">1-59749-615-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496162</subfield><subfield code="9">978-1-59749-616-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496162</subfield><subfield code="9">1-59749-616-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn722800242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)722800242</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125591</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.15/5</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wheeler, Evan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security risk management</subfield><subfield code="b">building an information security risk management program from the ground up</subfield><subfield code="c">Evan Wheeler</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 340 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">ITPro</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Risk management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597496155</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506045</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597496155</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125591 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
isbn | 9781597496155 1597496154 9781597496162 1597496162 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506045 |
oclc_num | 722800242 |
open_access_boolean | |
physical | 1 online resource (xxi, 340 pages) |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress |
record_format | marc |
series2 | ITPro |
spelling | Wheeler, Evan Verfasser aut Security risk management building an information security risk management program from the ground up Evan Wheeler Waltham, MA Syngress © 2011 1 online resource (xxi, 340 pages) txt rdacontent c rdamedia cr rdacarrier ITPro Includes bibliographical references and index The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management bisacsh Risk management fast Risk management Risk management Security measures Risikomanagement (DE-588)4121590-4 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 s Risikomanagement (DE-588)4121590-4 s 1\p DE-604 http://www.sciencedirect.com/science/book/9781597496155 Verlag URL des Erstveröffentlichers Volltext data file rda 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Wheeler, Evan Security risk management building an information security risk management program from the ground up BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management bisacsh Risk management fast Risk management Risk management Security measures Risikomanagement (DE-588)4121590-4 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4121590-4 (DE-588)4061963-1 |
title | Security risk management building an information security risk management program from the ground up |
title_auth | Security risk management building an information security risk management program from the ground up |
title_exact_search | Security risk management building an information security risk management program from the ground up |
title_full | Security risk management building an information security risk management program from the ground up Evan Wheeler |
title_fullStr | Security risk management building an information security risk management program from the ground up Evan Wheeler |
title_full_unstemmed | Security risk management building an information security risk management program from the ground up Evan Wheeler |
title_short | Security risk management |
title_sort | security risk management building an information security risk management program from the ground up |
title_sub | building an information security risk management program from the ground up |
topic | BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management bisacsh Risk management fast Risk management Risk management Security measures Risikomanagement (DE-588)4121590-4 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management Risk management Risk management Security measures Risikomanagement Unternehmen |
url | http://www.sciencedirect.com/science/book/9781597496155 |
work_keys_str_mv | AT wheelerevan securityriskmanagementbuildinganinformationsecurityriskmanagementprogramfromthegroundup |