Information Security Risk Analysis
Seiten
2001
Crc Press Inc (Verlag)
978-0-8493-0880-2 (ISBN)
Crc Press Inc (Verlag)
978-0-8493-0880-2 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Discusses the principle of risk management and its three key elements: risk analysis, risk assessment, and vulnerability assessment. This work examines the differences between quantitative and qualitative risk assessment, and details how various types of qualitative risk assessment can be applied to the assessment process.
Risk is a cost of doing business. The question is, "What are the risks, and what are their costs?" Knowing the vulnerabilities and threats that face your organization's information and systems is the first essential step in risk management.
Information Security Risk Analysis shows you how to use cost-effective risk analysis techniques to identify and quantify the threats--both accidental and purposeful--that your organization faces. The book steps you through the qualitative risk analysis process using techniques such as PARA (Practical Application of Risk Analysis) and FRAP (Facilitated Risk Analysis Process) to:
Evaluate tangible and intangible risks
Use the qualitative risk analysis process
Identify elements that make up a strong Business Impact Analysis
Conduct risk analysis with confidence
Management looks to you, its information security professional, to provide a process that allows for the systematic review of risk, threats, hazards, and concerns, and to provide cost-effective measures to lower risk to an acceptable level. You can find books that cover risk analysis for financial, environmental, and even software projects, but you will find none that apply risk analysis to information technology and business continuity planning or deal with issues of loss of systems configuration, passwords, information loss, system integrity, CPU cycles, bandwidth, and more. Information Security Risk Analysis shows you how to determine cost effective solutions for your organization's information technology.
Risk is a cost of doing business. The question is, "What are the risks, and what are their costs?" Knowing the vulnerabilities and threats that face your organization's information and systems is the first essential step in risk management.
Information Security Risk Analysis shows you how to use cost-effective risk analysis techniques to identify and quantify the threats--both accidental and purposeful--that your organization faces. The book steps you through the qualitative risk analysis process using techniques such as PARA (Practical Application of Risk Analysis) and FRAP (Facilitated Risk Analysis Process) to:
Evaluate tangible and intangible risks
Use the qualitative risk analysis process
Identify elements that make up a strong Business Impact Analysis
Conduct risk analysis with confidence
Management looks to you, its information security professional, to provide a process that allows for the systematic review of risk, threats, hazards, and concerns, and to provide cost-effective measures to lower risk to an acceptable level. You can find books that cover risk analysis for financial, environmental, and even software projects, but you will find none that apply risk analysis to information technology and business continuity planning or deal with issues of loss of systems configuration, passwords, information loss, system integrity, CPU cycles, bandwidth, and more. Information Security Risk Analysis shows you how to determine cost effective solutions for your organization's information technology.
Effective Risk Analysis
Qualitative Risk Analysis
Value Analysis
Other Qualitative Methods
Facilitated Risk Analysis Process (FRAP)
Other Uses of Qualitative Risk Analysis
Case Study
Appendix A: Questionnaire
Appendix B: Facilitated Risk Analysis Process Forms
Appendix C: Business Impact Analysis Forms
Appendix D: Sample of Report
Appendix E: Threat Definitions
Appendix F: Other Risk Analysis Opinions
Index
Erscheint lt. Verlag | 23.1.2001 |
---|---|
Zusatzinfo | 50 Illustrations, black and white |
Verlagsort | Bosa Roca |
Sprache | englisch |
Maße | 178 x 254 mm |
Gewicht | 721 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 0-8493-0880-1 / 0849308801 |
ISBN-13 | 978-0-8493-0880-2 / 9780849308802 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €