Risk Management for Computer Security: Protecting Your Network and Information Assets
By Andy Jones and Debi Ashenden
1/5
()
About this ebook
Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk program for computer security. It presents an integrated how-to approach to implementing a corporate program, complete with tested methods and processes, flowcharts, and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will help professionals in meeting their challenges as we progress through the twenty-first century.
This book is organized into five sections. Section I introduces the reader to the theories of risk management and describes the field's changing environment as well as the art of managing risks. Section II deals with threat assessment and its input to risk assessment; topics covered include the threat assessment method and an example of threat assessment. Section III focuses on operating system vulnerabilities and discusses application vulnerabilities; public domain vs. COTS; and connectivity and dependence. Section IV explains what risk assessment is and Section V explores qualitative vs. quantitative tools and types of risk assessment and concludes with an assessment of the future of risk management.
Corporate security professionals around the world will find this book a highly valuable source of information.
- Presents material in an engaging, easy-to-follow manner that will appeal to both advanced INFOSEC career professionals and network administrators entering the information security profession
- Addresses the needs of both the individuals who are new to the subject as well as of experienced professionals
- Provides insight into the factors that need to be considered and fully explains the numerous methods, processes and procedures of risk management
Andy Jones
Andy Jones is a well-known and loved children's entertainer. He has toured schools Australia wide with his children's show ANDY JONES & THE FUNKY MONKEY. He is the author of the hugely popular and best-selling THE FARTIONARY, and has also produced CDs and audio tapes.
Read more from Andy Jones
The Two of Us: A Novel Rating: 4 out of 5 stars4/5The Trouble with Henry and Zoe Rating: 4 out of 5 stars4/544 Best Ever Fart Jokes & Poems Rating: 0 out of 5 stars0 ratingsVirtualization with Microsoft Virtual Server 2005 Rating: 0 out of 5 stars0 ratingsThe Fartionary Rating: 0 out of 5 stars0 ratingsThe Burptionary Rating: 0 out of 5 stars0 ratingsThe Corporate Security Professional's Handbook on Terrorism Rating: 0 out of 5 stars0 ratings
Related to Risk Management for Computer Security
Related ebooks
The True Cost of Information Security Breaches and Cyber Crime Rating: 0 out of 5 stars0 ratingsIT Induction and Information Security Awareness: A Pocket Guide Rating: 0 out of 5 stars0 ratingsSecurity Technology Convergence Insights Rating: 0 out of 5 stars0 ratingsHow to Cheat at Managing Information Security Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsManaging Online Risk: Apps, Mobile, and Social Media Security Rating: 0 out of 5 stars0 ratingsISO IEC 27001 A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsInformation Security Architecture Standard Requirements Rating: 0 out of 5 stars0 ratingsIT Risk Management Process A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsPrivileged Access Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsISO 19770 A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsIT Security Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsMCTS 70-680 Exam Questions: Microsoft Windows 7, Configuring Rating: 4 out of 5 stars4/5Managing Cybersecurity Risk: Cases Studies and Solutions Rating: 5 out of 5 stars5/5security controls A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsPCI Compliance A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIncident Response Team A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsEC Council Certified Incident Handler A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIntrusion Prevention Systems A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsQualified Security Assessor Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Regulations A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsISO IEC 27001 Lead Auditor A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIT Governance A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsCCISO A Complete Guide - 2020 Edition Rating: 1 out of 5 stars1/5Risk and Cybersecurity Third Edition Rating: 0 out of 5 stars0 ratingsIT Asset Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsInformation Security Program Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratings
Security For You
Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsMike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5How I Rob Banks: And Other Such Places Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings
Reviews for Risk Management for Computer Security
1 rating0 reviews