menu
{ "item_title" : "Implementing a Best Practice Risk Assessment Methodology", "item_author" : [" Eric Vanderburg "], "item_description" : "Document from the year 2013 in the subject Business economics - Information Management, language: English, abstract: Risk assessments play a critical role in the development and implementation of effective information security programs and help address a range of security related issues from advanced persistent threats to supply chain concerns. The results of risk assessments are used to develop specific courses of action that can provide effective response measures to the identified risks as part of a broad-based risk management process. The guidance provided here uses the key risk factors of threats, vulnerabilities, impact to missions and business operations, and the likelihood of threat exploitation of weaknesses in information systems and environments of operation, to help senior leaders and executives understand and assess the current information security risks to information technology infrastructure.", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/3/65/682/045/3656820457_b.jpg", "price_data" : { "retail_price" : "18.50", "online_price" : "18.50", "our_price" : "18.50", "club_price" : "18.50", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Implementing a Best Practice Risk Assessment Methodology|Eric Vanderburg

Implementing a Best Practice Risk Assessment Methodology

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Document from the year 2013 in the subject Business economics - Information Management, language: English, abstract: Risk assessments play a critical role in the development and implementation of effective information security programs and help address a range of security related issues from advanced persistent threats to supply chain concerns. The results of risk assessments are used to develop specific courses of action that can provide effective response measures to the identified risks as part of a broad-based risk management process. The guidance provided here uses the key risk factors of threats, vulnerabilities, impact to missions and business operations, and the likelihood of threat exploitation of weaknesses in information systems and environments of operation, to help senior leaders and executives understand and assess the current information security risks to information technology infrastructure.

This item is Non-Returnable

Details

  • ISBN-13: 9783656820451
  • ISBN-10: 3656820457
  • Publisher: Grin Verlag
  • Publish Date: October 2014
  • Dimensions: 8.27 x 5.83 x 0.11 inches
  • Shipping Weight: 0.15 pounds
  • Page Count: 44

Related Categories

You May Also Like...

    1

BAM Customer Reviews