Information security risk assessment toolkit: practical assessments through data collection and data analysis
In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus a...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress/Elsevier
2012
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597497350/?ar |
Zusammenfassung: | In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Ris. |
Beschreibung: | Print version record |
Umfang: | 1 Online-Ressource (1 volume) |
ISBN: | 9781597499750 1597499757 9781597497350 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047648295 | ||
003 | DE-627-1 | ||
005 | 20240228115230.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2012 xx |||||o 00| ||eng c | ||
020 | |a 9781597499750 |9 978-1-59749-975-0 | ||
020 | |a 1597499757 |9 1-59749-975-7 | ||
020 | |a 9781597497350 |9 978-1-59749-735-0 | ||
035 | |a (DE-627-1)047648295 | ||
035 | |a (DE-599)KEP047648295 | ||
035 | |a (ORHE)9781597497350 | ||
035 | |a (DE-627-1)047648295 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Talabis, Mark Ryan M. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Information security risk assessment toolkit |b practical assessments through data collection and data analysis |c Mark Ryan M. Talabis, Jason L. Martin ; Evan Wheeler, technical editor |
264 | 1 | |a Waltham, MA |b Syngress/Elsevier |c 2012 | |
300 | |a 1 Online-Ressource (1 volume) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
520 | |a In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Ris. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Risk assessment | |
650 | 0 | |a Data mining | |
650 | 2 | |a Computer Security | |
650 | 2 | |a Risk Assessment | |
650 | 2 | |a Data Mining | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Évaluation du risque | |
650 | 4 | |a Exploration de données (Informatique) | |
650 | 4 | |a risk assessment | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data mining | |
650 | 4 | |a Risk assessment | |
700 | 1 | |a Martin, Jason |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597497350 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597497350 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597497350/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047648295 |
---|---|
_version_ | 1821494867353665536 |
adam_text | |
any_adam_object | |
author | Talabis, Mark Ryan M. |
author2 | Martin, Jason |
author2_role | ctb |
author2_variant | j m jm |
author_facet | Talabis, Mark Ryan M. Martin, Jason |
author_role | aut |
author_sort | Talabis, Mark Ryan M. |
author_variant | m r m t mrm mrmt |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047648295 (DE-599)KEP047648295 (ORHE)9781597497350 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02460cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-047648295</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115230.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499750</subfield><subfield code="9">978-1-59749-975-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499757</subfield><subfield code="9">1-59749-975-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597497350</subfield><subfield code="9">978-1-59749-735-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648295</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047648295</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597497350</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648295</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Talabis, Mark Ryan M.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security risk assessment toolkit</subfield><subfield code="b">practical assessments through data collection and data analysis</subfield><subfield code="c">Mark Ryan M. Talabis, Jason L. Martin ; Evan Wheeler, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress/Elsevier</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Ris.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Risk Assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Data Mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Évaluation du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Exploration de données (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk assessment</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martin, Jason</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597497350</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597497350</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597497350/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047648295 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:12Z |
institution | BVB |
isbn | 9781597499750 1597499757 9781597497350 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress/Elsevier |
record_format | marc |
spelling | Talabis, Mark Ryan M. VerfasserIn aut Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin ; Evan Wheeler, technical editor Waltham, MA Syngress/Elsevier 2012 1 Online-Ressource (1 volume) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Ris. Computer security Risk assessment Data mining Computer Security Risk Assessment Data Mining Sécurité informatique Évaluation du risque Exploration de données (Informatique) risk assessment Martin, Jason MitwirkendeR ctb 9781597497350 Erscheint auch als Druck-Ausgabe 9781597497350 |
spellingShingle | Talabis, Mark Ryan M. Information security risk assessment toolkit practical assessments through data collection and data analysis Computer security Risk assessment Data mining Computer Security Risk Assessment Data Mining Sécurité informatique Évaluation du risque Exploration de données (Informatique) risk assessment |
title | Information security risk assessment toolkit practical assessments through data collection and data analysis |
title_auth | Information security risk assessment toolkit practical assessments through data collection and data analysis |
title_exact_search | Information security risk assessment toolkit practical assessments through data collection and data analysis |
title_full | Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin ; Evan Wheeler, technical editor |
title_fullStr | Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin ; Evan Wheeler, technical editor |
title_full_unstemmed | Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin ; Evan Wheeler, technical editor |
title_short | Information security risk assessment toolkit |
title_sort | information security risk assessment toolkit practical assessments through data collection and data analysis |
title_sub | practical assessments through data collection and data analysis |
topic | Computer security Risk assessment Data mining Computer Security Risk Assessment Data Mining Sécurité informatique Évaluation du risque Exploration de données (Informatique) risk assessment |
topic_facet | Computer security Risk assessment Data mining Computer Security Risk Assessment Data Mining Sécurité informatique Évaluation du risque Exploration de données (Informatique) risk assessment |
work_keys_str_mv | AT talabismarkryanm informationsecurityriskassessmenttoolkitpracticalassessmentsthroughdatacollectionanddataanalysis AT martinjason informationsecurityriskassessmenttoolkitpracticalassessmentsthroughdatacollectionanddataanalysis |