skip to content
Information security risk assessment toolkit : practical assessments through data collection and data analysis Preview this item
ClosePreview this item
Checking...

Information security risk assessment toolkit : practical assessments through data collection and data analysis

Author: Mark Talabis; Jason Martin
Publisher: Amsterdam ; Boston : Syngress, ©2012.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Mark Talabis; Jason Martin
OCLC Number: 814380381
Notes: Includes index.
Title from publisher's Web site (ScienceDirect; viewed on Oct. 25, 2012).
Description: 1 online resource
Contents: Chapter 1: Information Security Risk Assessments Chapter 2: A Practical Approach Chapter 3: Data Collection Chapter 4: Data Analysis Chapter 5: Risk Assessment Chapter 6: Risk Prioritization and Treatment Chapter 7: Reporting Chapter 8: Maintenance and Wrap Up
Responsibility: Mark Ryan M. Talabis, Jason L. Martin.

Abstract:

Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/814380381> # Information security risk assessment toolkit : practical assessments through data collection and data analysis
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "814380381" ;
    library:placeOfPublication <http://dbpedia.org/resource/Boston> ; # Boston
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1174477796#Place/amsterdam> ; # Amsterdam
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/ne> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://id.worldcat.org/fast/888063> ; # Database security
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/272337978> ; # Jason Martin
    schema:copyrightYear "2012" ;
    schema:creator <http://viaf.org/viaf/271994365> ; # Mark Talabis
    schema:datePublished "2012" ;
    schema:description "In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1174477796> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:name "Information security risk assessment toolkit : practical assessments through data collection and data analysis"@en ;
    schema:productID "814380381" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/814380381#PublicationEvent/amsterdam_boston_syngress_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1174477796#Agent/syngress> ; # Syngress
    schema:url <http://0-www.sciencedirect.com.pugwash.lib.warwick.ac.uk/science/book/9781597497350> ;
    schema:url <http://dproxy.library.dc-uoit.ca/login?url=https://www.sciencedirect.com/science/book/9781597497350> ;
    schema:url <http://www.sciencedirect.com/science/book/9781597497350> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/814380381> ;
    .


Related Entities

<http://dbpedia.org/resource/Boston> # Boston
    a schema:Place ;
    schema:name "Boston" ;
    .

<http://dproxy.library.dc-uoit.ca/login?url=https://www.sciencedirect.com/science/book/9781597497350>
    rdfs:comment "eBook available for Durham College via Elsevier. Click link to access" ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://id.worldcat.org/fast/888063> # Database security
    a schema:Intangible ;
    schema:name "Database security"@en ;
    .

<http://viaf.org/viaf/271994365> # Mark Talabis
    a schema:Person ;
    schema:familyName "Talabis" ;
    schema:givenName "Mark" ;
    schema:name "Mark Talabis" ;
    .

<http://viaf.org/viaf/272337978> # Jason Martin
    a schema:Person ;
    schema:familyName "Martin" ;
    schema:givenName "Jason" ;
    schema:name "Jason Martin" ;
    .

<http://www.worldcat.org/title/-/oclc/814380381>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/814380381> ; # Information security risk assessment toolkit : practical assessments through data collection and data analysis
    schema:dateModified "2018-07-21" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.