Information Security Risk Analysis

ISBN-10: 1439839565
ISBN-13: 9781439839560
Edition: 3rd 2010 (Revised)
List price: $57.99 Buy it from $42.37
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This crucial process should not be a long, drawn-out affair. To be  More...

Used Starting from $42.37
New Starting from $100.40
eBooks Starting from $33.58
Rent
Buy
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Italian Grammar Online content $4.95 $1.99
Add to cart
Study Briefs
Portuguese Grammar Online content $4.95 $1.99
Add to cart
Study Briefs
Spanish Grammar Online content $4.95 $1.99
Add to cart
Study Briefs
German Grammar Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $57.99
Edition: 3rd
Copyright year: 2010
Publisher: Auerbach Publishers, Incorporated
Publication date: 3/16/2010
Binding: Hardcover
Pages: 456
Size: 6.25" wide x 9.25" long x 1.00" tall
Weight: 1.848
Language: English

The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This crucial process should not be a long, drawn-out affair. To be effective, it must be done quickly and efficiently.Information Security Risk Analysis, Second Edition enables CIOs, CSOs, and MIS managers to understand when, why, and how risk assessments and analyses can be conducted effectively. This book discusses the principle of risk management and its three key elements: risk analysis, risk assessment, and vulnerability assessment. It examines the differences between quantitative and qualitative risk assessment, and details how various types of qualitative risk assessment can be applied to the assessment process. The text offers a thorough discussion of recent changes to FRAAP and the need to develop a pre-screening method for risk assessment and business impact analysis.

Peltier has numerous years of field experience in corporate information security, and is a member of the Advisory Council of the Computer Security Institute (CSI).

Acknowledgments
About the Author
Introduction
The Facilitated Risk Analysis and Assessment Process (FRAAP)
Introduction
FRAAP Overview
FRAAP History
Introducing the FRAAP
Key Concepts
The Pre-FRAAP Meeting
Pre-FRAAP Meeting Checklist
Pre-FRAAP Meeting Summary
The FRAAP Session
Overview
FRAAP Session Introduction
FRAAP Session Talking Points
FRAAP Threats Identification
Identifying Threats Using a Checklist
Identifying Existing Controls
Establishing Risk Levels
Residual Risk
Using a Threats Identification Checklist
FRAAP Session Summary
Post-FRAAP Process
Complete the Action Plan
Conclusion
Risk Analysis (Project Impact Analysis)
Overview
The Difference between Risk Analysis and Risk Assessment
Risk Analysis and Due Diligence
Risk Assessment and Fiduciary Duty
Performing a Risk Analysis
Risk Analysis Elements
Other Considerations
When to Conduct a Risk Analysis
Final Words
Sample Risk Analysis Questionnaire
Sample Risk Analysis Report Outline
Pre-Screening
Introduction
Background
Pre-Screening Example 1
Pre-Screening Example 2
Pre-Screening Example 3
Pre-Screening Example 4
Summary
Business Impact Analysis
Overview
BIA versus Risk Assessment
Creating a BIA Process
Creating the Financial Impact Table
Working the BIA Process
Additional Examples
Objectives of the BIA
Using Questionnaires for a BIA
Data Collection and Analysis
Prepare Management Presentation
Final Thoughts
Gap Analysis
Introduction
Background
GAP Analysis Process
Gap Analysis Example 1
Gap Analysis Example 2
How to Use the Self-Assessment Checklist
Summary
Facilitator Skills
FRAAP Team Members
Introduction
The Risk Assessment Team
Conclusion
Project Scope Statement
Overview
Summary
Laws, Standards, and Regulations
Frequently Asked Questions about Risk Management
Introduction
Is There a Difference between Risk Analysis and Risk Assessment?
Why Should a Risk Analysis Be Conducted?
When Should a Risk Assessment Be Conducted?
Who Should Conduct the Risk Assessment?
How Long Should a Risk Assessment Take?
What Can a Risk Analysis or Risk Assessment Analyze?
Who Should Review the Results of a Risk Analysis and Risk Assessment?
How Is the Success of the Risk Analysis Measured?
Summary
Risk Analysis versus Risk Assessment
Overview
The Difference between Risk Analysis and Risk Assessment
Risk Analysis and Due Diligence
Risk Assessment and Fiduciary Duty
Conducting a Risk Assessment
Risk Assessment Timetable
Risk Assessment and Risk Analysis Results
Risk Management Metrics
Summary
Sample Threat Checklist
Sample BIA Questionnaire
Sample Risk Assessment Management Summary Report
Risk Assessment Scope Summary
Assessment Methodology Used
Assessment Findings and Action Plan
Full Findings Documentation
Conclusion
Project Scope Statement
Introduction
Project Statement
Specifications
Well-Defined Standards and Metrics
Summary
Why Risk Assessments Fail
Scope Creep
Ineffective Project Team
Stating Concerns as How They Impact Security
Every Threat Is a Major Concern
Conclusion
Gap Analysis Examples
Overview
Gap Analysis Using ISO 17799
Answer the Following Questions
Gap Analysis Using Utility-Specific Standards
Gap Analysis Sample 3 Using Combination of Standards and Laws
Control Lists
Overview
Heat Charts
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×