Security risk management : building an information security risk management program from the ground up
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Amsterdam Waltham, MA
Name of Publisher, Distributor, etc.
Syngress
Date of Publication, Distribution, etc.
2011
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
xx, 340 p. ; 24 cm
GENERAL NOTES
Text of Note
Includes bibliographical references
NOTES PERTAINING TO TITLE AND STATEMENT OF RESPONSIBILITY
Text of Note
Evan Wheeler
CONTENTS NOTE
Text of Note
Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 01: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables