Security Risk Management.rar
- Type:
- Other > E-books
- Files:
- 1
- Size:
- 2.23 MB
- Texted language(s):
- English
- Quality:
- +0 / -0 (0)
- Uploaded:
- Jan 2, 2012
- By:
- rlmovie
Security Risk Management Format : PDF Paperback: 360 pages Publisher: Syngress (May 2011) Language: English ISBN-10: 1597496154 ISBN-13: 978-1597496155 The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they canΓΓé¼Γäót explain why. This book will help you to break free from the so-called ΓΓé¼┼ôbest practicesΓΓé¼┬¥ argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk Presents a roadmap for designing and implementing a security risk management program Table of Contents Part I ΓΓé¼ΓÇ£ Introduction to Risk Management Chapter 1. The Security Evolution Chapter 2. Risky Business Chapter 3. The Risk Management Lifecycle Chapter 4. Risk Profiling Part II ΓΓé¼ΓÇ£ Risk Assessment and Analysis Techniques Chapter 5. Formulating a Risk Chapter 6. Risk Exposure Factors Chapter 7. Security Controls and Services Chapter 8. Risk Evaluation and Mitigation Strategies Chapter 9. Reports and Consulting Chapter 10. Risk Assessment Techniques Part III ΓΓé¼ΓÇ£ Building and Running a Risk Management Program Chapter 11. Threat and Vulnerability Management Chapter 12. Security Risk Reviews Chapter 13. A Blueprint for Security Chapter 14. Building a Program from Scratch