Information security risk assessment toolkit: practical assessments through data collection and data analysis
In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus a...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam Boston
Syngress
© 2012
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment |
Beschreibung: | Includes index. - Title from publisher's Web site (ScienceDirect; viewed on Oct. 25, 2012) |
Beschreibung: | 1 online resource |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125916 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2012 |||| o||u| ||||||eng d | ||
035 | |a (ZDB-33-ESD)ocn814380381 | ||
035 | |a (OCoLC)814380381 | ||
035 | |a (DE-599)BVBBV046125916 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Talabis, Mark |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security risk assessment toolkit |b practical assessments through data collection and data analysis |c Mark Ryan M. Talabis, Jason L. Martin |
264 | 1 | |a Amsterdam |a Boston |b Syngress |c © 2012 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index. - Title from publisher's Web site (ScienceDirect; viewed on Oct. 25, 2012) | ||
520 | |a In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment | ||
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Database security |2 fast | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Database security | |
700 | 1 | |a Martin, Jason |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597497355 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597497350 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597497350 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506369 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597497350 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180445493985280 |
---|---|
any_adam_object | |
author | Talabis, Mark |
author_facet | Talabis, Mark |
author_role | aut |
author_sort | Talabis, Mark |
author_variant | m t mt |
building | Verbundindex |
bvnumber | BV046125916 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn814380381 (OCoLC)814380381 (DE-599)BVBBV046125916 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02653nmm a2200421zc 4500</leader><controlfield tag="001">BV046125916</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn814380381</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)814380381</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125916</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Talabis, Mark</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security risk assessment toolkit</subfield><subfield code="b">practical assessments through data collection and data analysis</subfield><subfield code="c">Mark Ryan M. Talabis, Jason L. Martin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="a">Boston</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Title from publisher's Web site (ScienceDirect; viewed on Oct. 25, 2012)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martin, Jason</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597497355</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597497350</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597497350</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506369</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597497350</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125916 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506369 |
oclc_num | 814380381 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Talabis, Mark Verfasser aut Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin Amsterdam Boston Syngress © 2012 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes index. - Title from publisher's Web site (ScienceDirect; viewed on Oct. 25, 2012) In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment Computer networks / Security measures fast Data protection fast Database security fast Data protection Computer networks Security measures Database security Martin, Jason Sonstige oth Erscheint auch als Druck-Ausgabe 1597497355 Erscheint auch als Druck-Ausgabe 9781597497350 http://www.sciencedirect.com/science/book/9781597497350 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Talabis, Mark Information security risk assessment toolkit practical assessments through data collection and data analysis Computer networks / Security measures fast Data protection fast Database security fast Data protection Computer networks Security measures Database security |
title | Information security risk assessment toolkit practical assessments through data collection and data analysis |
title_auth | Information security risk assessment toolkit practical assessments through data collection and data analysis |
title_exact_search | Information security risk assessment toolkit practical assessments through data collection and data analysis |
title_full | Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin |
title_fullStr | Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin |
title_full_unstemmed | Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin |
title_short | Information security risk assessment toolkit |
title_sort | information security risk assessment toolkit practical assessments through data collection and data analysis |
title_sub | practical assessments through data collection and data analysis |
topic | Computer networks / Security measures fast Data protection fast Database security fast Data protection Computer networks Security measures Database security |
topic_facet | Computer networks / Security measures Data protection Database security Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597497350 |
work_keys_str_mv | AT talabismark informationsecurityriskassessmenttoolkitpracticalassessmentsthroughdatacollectionanddataanalysis AT martinjason informationsecurityriskassessmenttoolkitpracticalassessmentsthroughdatacollectionanddataanalysis |