skip to content
Information security risk analysis Preview this item
ClosePreview this item
Checking...

Information security risk analysis

Author: Thomas R Peltier
Publisher: Boca Raton : Auerbach Publications, 2005.
Edition/Format:   Print book : English : 2nd edView all editions and formats
Summary:
"Information Security Risk Analysis, Second Edition enables CIOs, CSOs, and MIS managers to understand when, why, and how risk assessments and analyses can be conducted effectively. This book discusses the principle of risk management and its three key elements: risk analysis, risk assessment, and vulnerability assessment. It examines the differences between quantitative and qualitative risk assessment, and details  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Thomas R Peltier
ISBN: 0849333466 9780849333460 9781420031195 1420031198
OCLC Number: 57168595
Description: xvi, 344 pages : illustrations ; 24 cm
Contents: Effective Risk Analysis --
Qualitative Risk Analysis --
Value Analysis --
Other Qualitative Methods --
Facilitated Risk Analysis Process (FRAP) --
Other Uses of Qualitative Risk Analysis --
Questionnaire --
Facilitated Risk Analysis Process (FRAP) Forms --
Scope/Business Process Identification --
Action Plan --
Final Report --
Controls List --
Risk List --
Control/Risks Cross Reference List --
Business Impact Analysis (BIA) Forms --
Sample of Report --
Threat Definitions --
Other Risk Analysis Opinions --
Risk Assessment and Management / Will Ozier --
New Trends in Risk Management / Caroline Hamilton --
Integrated Risk Management--A Concept for Risk Containment / Jose Martinez.
Responsibility: Thomas R. Peltier.
More information:

Abstract:

The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This book  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/57168595> # Information security risk analysis
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "57168595" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/133185#Place/boca_raton> ; # Boca Raton
    schema:about <http://experiment.worldcat.org/entity/work/data/133185#Topic/risiko> ; # Risiko
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/133185#Topic/projektmanagement> ; # Projektmanagement
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/133185#Topic/evaluation_du_risque> ; # Évaluation du risque
    schema:about <http://experiment.worldcat.org/entity/work/data/133185#Topic/computerbeveiliging> ; # Computerbeveiliging
    schema:about <http://experiment.worldcat.org/entity/work/data/133185#Topic/reseaux_d_ordinateurs_securite_mesures> ; # Réseaux d'ordinateurs--Sécurité--Mesures
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/133185#Topic/computersicherheit> ; # Computersicherheit
    schema:about <http://experiment.worldcat.org/entity/work/data/133185#Topic/databescherming> ; # Databescherming
    schema:about <http://experiment.worldcat.org/entity/work/data/133185#Topic/informatietechnologie> ; # Informatietechnologie
    schema:about <http://id.worldcat.org/fast/1098146> ; # Risk assessment
    schema:bookEdition "2nd ed." ;
    schema:bookFormat bgn:PrintBook ;
    schema:creator <http://viaf.org/viaf/65693642> ; # Thomas R. Peltier
    schema:datePublished "2005" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/133185> ;
    schema:inLanguage "en" ;
    schema:name "Information security risk analysis"@en ;
    schema:productID "57168595" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/57168595#PublicationEvent/boca_raton_auerbach_publications_2005> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/133185#Agent/auerbach_publications> ; # Auerbach Publications
    schema:reviews <http://www.worldcat.org/title/-/oclc/57168595#Review/-1876620300> ;
    schema:url <http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014908811&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA> ;
    schema:workExample <http://worldcat.org/isbn/9781420031195> ;
    schema:workExample <http://worldcat.org/isbn/9780849333460> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA513767> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/57168595> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/133185#Agent/auerbach_publications> # Auerbach Publications
    a bgn:Agent ;
    schema:name "Auerbach Publications" ;
    .

<http://experiment.worldcat.org/entity/work/data/133185#Topic/computerbeveiliging> # Computerbeveiliging
    a schema:Intangible ;
    schema:name "Computerbeveiliging"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/133185#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/133185#Topic/databescherming> # Databescherming
    a schema:Intangible ;
    schema:name "Databescherming"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/133185#Topic/evaluation_du_risque> # Évaluation du risque
    a schema:Intangible ;
    schema:name "Évaluation du risque"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/133185#Topic/informatietechnologie> # Informatietechnologie
    a schema:Intangible ;
    schema:name "Informatietechnologie"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/133185#Topic/projektmanagement> # Projektmanagement
    a schema:Intangible ;
    schema:name "Projektmanagement"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/133185#Topic/reseaux_d_ordinateurs_securite_mesures> # Réseaux d'ordinateurs--Sécurité--Mesures
    a schema:Intangible ;
    schema:name "Réseaux d'ordinateurs--Sécurité--Mesures"@fr ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1098146> # Risk assessment
    a schema:Intangible ;
    schema:name "Risk assessment"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/65693642> # Thomas R. Peltier
    a schema:Person ;
    schema:familyName "Peltier" ;
    schema:givenName "Thomas R." ;
    schema:name "Thomas R. Peltier" ;
    .

<http://worldcat.org/isbn/9780849333460>
    a schema:ProductModel ;
    schema:isbn "0849333466" ;
    schema:isbn "9780849333460" ;
    .

<http://worldcat.org/isbn/9781420031195>
    a schema:ProductModel ;
    schema:isbn "1420031198" ;
    schema:isbn "9781420031195" ;
    .

<http://www.worldcat.org/title/-/oclc/57168595#Review/-1876620300>
    a schema:Review ;
    schema:itemReviewed <http://www.worldcat.org/oclc/57168595> ; # Information security risk analysis
    schema:reviewBody ""Information Security Risk Analysis, Second Edition enables CIOs, CSOs, and MIS managers to understand when, why, and how risk assessments and analyses can be conducted effectively. This book discusses the principle of risk management and its three key elements: risk analysis, risk assessment, and vulnerability assessment. It examines the differences between quantitative and qualitative risk assessment, and details how various types of qualitative risk assessment can be applied to the assessment process. The text offers a thorough discussion of recent changes to the Facilitated Risk Analysis and Assessment Process (FRAAP) and the need to develop a pre-screening method for risk assessment and business impact analysis."--Jacket." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.