| 000 | 00000nam u2200205 a 4500 | |
| 001 | 000045976760 | |
| 005 | 20190321132755 | |
| 008 | 190320s2014 enka b 001 0 eng d | |
| 020 | ▼a 9781780172651 | |
| 040 | ▼a 211009 ▼c 211009 ▼d 211009 | |
| 082 | 0 4 | ▼a 658.4038 ▼2 23 |
| 084 | ▼a 658.4038 ▼2 DDCK | |
| 090 | ▼a 658.4038 ▼b S967i | |
| 100 | 1 | ▼a Sutton, David. |
| 245 | 1 0 | ▼a Information risk management : ▼b a practitioner's guide / ▼c David Sutton. |
| 260 | ▼a Swindon, United Kingdom : ▼b BCS Learning & Development Limited, ▼c 2014. | |
| 300 | ▼a xxxi, 210 p. : ▼b ill. ; ▼c 25 cm. | |
| 504 | ▼a Includes bibliographical references and index. | |
| 945 | ▼a KLPA |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 658.4038 S967i | 등록번호 121248339 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Increasingly, organisations rely on information for their day-to-day operations, and the loss or unavailability of information can mean the difference between success and ruin. Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It also includes a chapter on applying IRM in the public sector. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management.
"Anyone wishing to become an InfoSec risk management practitioner MUST purchase this book. David has produced an extremely useful and readable book for those entering this discipline and indeed those practitioners wishing to have an invaluable reference resource sitting on their bookshelf. I highly recommended it." John Hughes, Member of the InfoSec Skills Faculty, Director, SecID Consultants--
"Information is the 21st century's new gold and protecting such a volatile asset is a tremendous challenge. This book provides many keys to understanding important concepts and possible approaches for mitigating the associated risks." Lionel Dupre, CISA, CISM, Networks and Information Security Expert at ENISA -
정보제공 :
목차
Cover -- Copyright -- CONTENTS -- LIST OF FIGURES AND TABLES -- AUTHOR -- ACKNOWLEDGMENTS -- ABBREVIATIONS -- DEFINITIONS, STANDARDS AND GLOSSARY OF TERMS -- PREFACE -- 1 THE NEED FOR INFORMATION RISK MANAGEMENT -- INTRODUCTION -- WHAT IS INFORMATION? -- THE INFORMATION LIFE CYCLE -- WHO SHOULD USE INFORMATION RISK MANAGEMENT? -- THE LEGAL FRAMEWORK -- THE CONTEXT OF RISK IN THE ORGANISATION -- THE BENEFITS OF TAKING ACCOUNT OF INFORMATION RISK -- OVERVIEW OF THE INFORMATION RISK MANAGEMENT PROCESS -- 2 REVIEW OF INFORMATION SECURITY FUNDAMENTALS -- INFORMATION CLASSIFICATION -- PLAN, DO, CHECK, ACT -- 3 THE INFORMATION RISK MANAGEMENT PROGRAMME -- GOALS, SCOPE AND OBJECTIVES -- ROLES AND RESPONSIBILITIES -- GOVERNANCE OF THE RISK MANAGEMENT PROGRAMME -- INFORMATION RISK MANAGEMENT CRITERIA -- 4 RISK IDENTIFICATION -- THE APPROACH TO RISK IDENTIFICATION -- IMPACT ASSESSMENT -- TYPES OF IMPACT -- QUALITATIVE AND QUANTITATIVE ASSESSMENTS -- 5 THREAT AND VULNERABILITY ASSESSMENT -- CONDUCTING THREAT ASSESSMENTS -- CONDUCTING VULNERABILITY ASSESSMENTS -- IDENTIFICATION OF EXISTING CONTROLS -- 6 RISK ANALYSIS AND RISK EVALUATION -- ASSESSMENT OF LIKELIHOOD -- RISK ANALYSIS -- RISK EVALUATION -- 7 RISK TREATMENT -- STRATEGIC RISK OPTIONS -- TACTICAL RISK MANAGEMENT CONTROLS -- OPERATIONAL RISK MANAGEMENT CONTROLS -- EXAMPLES OF CRITICAL CONTROLS AND CONTROL CATEGORIES -- 8 RISK REPORTING AND PRESENTATION -- BUSINESS CASES -- RISK TREATMENT DECISION-MAKING -- RISK TREATMENT PLANNING AND IMPLEMENTATION -- BUSINESS CONTINUITY AND DISASTER RECOVERY -- 9 COMMUNICATION, CONSULTATION, MONITORING AND REVIEW -- COMMUNICATION -- CONSULTATION -- RISK REVIEWS AND MONITORING -- 10 THE CESG IA CERTIFICATION SCHEME -- THE CESG IA CERTIFICATION SCHEME -- SKILLS FRAMEWORK FOR THE INFORMATION AGE (SFIA) -- THE IISP INFORMATION SECURITY SKILLS FRAMEWORK -- 11 HMG SECURITY-RELATED DOCUMENTS -- HMG SECURITY POLICY FRAMEWORK -- UK GOVERNMENT SECURITY CLASSIFICATIONS -- APPENDIX A TAXONOMIES AND DESCRIPTIONS -- INFORMATION RISK -- TYPICAL IMPACTS OR CONSEQUENCES -- APPENDIX B TYPICAL THREATS AND HAZARDS -- MALICIOUS INTRUSION (HACKING) -- ENVIRONMENTAL THREATS -- ERRORS AND FAILURES -- SOCIAL ENGINEERING -- MISUSE AND ABUSE -- PHYSICAL THREATS -- MALWARE -- APPENDIX C TYPICAL VULNERABILITIES -- ACCESS CONTROL -- POOR PROCEDURES -- PHYSICAL AND ENVIRONMENTAL SECURITY -- COMMUNICATIONS AND OPERATIONS MANAGEMENT -- PEOPLE-RELATED SECURITY FAILURES -- APPENDIX D INFORMATION RISK CONTROLS -- STRATEGIC CONTROLS -- TACTICAL CONTROLS -- OPERATIONAL CONTROLS -- CRITICAL SECURITY CONTROLS VERSION 5.0 -- ISO/IEC 27001 CONTROLS -- NIST SPECIAL PUBLICATION 800-53 REVISION 4 -- APPENDIX E METHODOLOGIES, GUIDELINES AND TOOLS -- METHODOLOGIES -- OTHER GUIDELINES AND TOOLS -- APPENDIX F TEMPLATES -- APPENDIX G HMG CYBER SECURITY GUIDELINES -- HMG CYBER ESSENTIALS SCHEME -- 10 STEPS TO CYBER SECURITY -- APPENDIX H REFERENCES AND FURTHER READING -- PRIMARY UK LEGISLATION -- GOOD PRACTICE GUIDELINES -- OTHER REFERENCE MATERIAL -- CESG CERTIFIED PROFESSIONAL SCHEME -- OTHER UK GOVERNMENT PUBLICATIONS -- RISK MANAGEMENT METHODOLOGIES -- NEWS ARTICLES ETC. -- UK AND INTERNATIONAL STANDARDS -- INDEX -- Back Cover -- .
