Buch, Englisch, 296 Seiten, Format (B × H): 152 mm x 229 mm
Protecting Your Network and Information Assets
Buch, Englisch, 296 Seiten, Format (B × H): 152 mm x 229 mm
ISBN: 978-0-7506-7795-0
Verlag: Elsevier Science & Technology
This book is organized into five sections. Section I introduces the reader to the theories of risk management and describes the field's changing environment as well as the art of managing risks. Section II deals with threat assessment and its input to risk assessment; topics covered include the threat assessment method and an example of threat assessment. Section III focuses on operating system vulnerabilities and discusses application vulnerabilities; public domain vs. COTS; and connectivity and dependence. Section IV explains what risk assessment is and Section V explores qualitative vs. quantitative tools and types of risk assessment and concludes with an assessment of the future of risk management.
Corporate security professionals around the world will find this book a highly valuable source of information.
- Presents material in an engaging, easy-to-follow manner that will appeal to both advanced INFOSEC career professionals and network administrators entering the information security profession
- Addresses the needs of both the individuals who are new to the subject as well as of experienced professionals
- Provides insight into the factors that need to be considered and fully explains the numerous methods, processes and procedures of risk management
Zielgruppe
Corporate security professionals around the world.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Section I: An Introduction to Risk Management: Introduction to the Theories of Risk Management; The Changing Environment; The Art of Managing Risks; Section II: The Threat Assessment Process: Threat Assessment and its Input to Risk Assessment; Threat Assessment Method; Example Threat Assessment; Section III: Vulnerability Issues: Operating System Vulnerabilities; Application Vulnerabilities; Public Domain or COTS?; Connectivity and Dependence; Section IV: The Risk Process: What is Risk Assessment?; Risk Analysis; Who is Responsible?; Section V:/Tools and Types of Risk Assessment: Qualitative versus Quantitative; The Policies, Procedures, Plans and Processes of Risk Management; Tools and Techniques; Integrated Risk Management; The Future of the Risk Management