building an information security risk management program from the ground up /
First Statement of Responsibility
Evan Wheeler.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Waltham, MA :
Name of Publisher, Distributor, etc.
Syngress,
Date of Publication, Distribution, etc.
2011.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
xx, 340 pages ;
Dimensions
24 cm
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references.
CONTENTS NOTE
Text of Note
Part I -- Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II -- Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III -- Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.