LEADER 05984nmm a2200709 u 4500
001 EB001926249
003 EBX01000000000000001089151
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9781780172675 
020 |a 9781780172668 
020 |a 9781780172682 
020 |a 1780172672 
020 |a 1780172664 
050 4 |a HD30.2 
100 1 |a Sutton, David 
245 0 0 |a Information Risk Management  |b a Practitioner's Guide  |c David Sutton 
260 |a London  |b BCS  |c 2014 
300 |a 210 pages 
505 0 |a Includes bibliographical references and index 
505 0 |a 3 the information risk management programmegoals, scope and objectives; roles and responsibilities; governance of the risk management programme; information risk management criteria; 4 risk identification; the approach to risk identification; impact assessment; types of impact; qualitative and quantitative assessments; 5 threat and vulnerability assessment; conducting threat assessments; conducting vulnerability assessments; identification of existing controls; 6 risk analysis and risk evaluation; assessment of likelihood; risk analysis; risk evaluation; 7 risk treatment 
505 0 |a 11 hmg security-related documentshmg security policy framework; uk government security classifications; appendix a taxonomies and descriptions; information risk; typical impacts or consequences; appendix b typical threats and hazards; malicious intrusion (hacking); environmental threats; errors and failures; social engineering; misuse and abuse; physical threats; malware; appendix c typical vulnerabilities; access control; poor procedures; physical and environmental security; communications and operations management; people-related security failures; appendix d information risk controls 
505 0 |a Cover; Copyright; CONTENTS; LIST OF FIGURES AND TABLES; AUTHOR; ACKNOWLEDGMENTS; ABBREVIATIONS; DEFINITIONS, STANDARDS AND GLOSSARY OF TERMS; PREFACE; 1 THE NEED FOR INFORMATION RISK MANAGEMENT; INTRODUCTION; WHAT IS INFORMATION?; THE INFORMATION LIFE CYCLE; WHO SHOULD USE INFORMATION RISK MANAGEMENT?; THE LEGAL FRAMEWORK; THE CONTEXT OF RISK IN THE ORGANISATION; THE BENEFITS OF TAKING ACCOUNT OF INFORMATION RISK; OVERVIEW OF THE INFORMATION RISK MANAGEMENT PROCESS; 2 REVIEW OF INFORMATION SECURITY FUNDAMENTALS; INFORMATION CLASSIFICATION; PLAN, DO, CHECK, ACT. 
505 0 |a Strategic controlstactical controls; operational controls; critical security controls version 5.0; iso/iec 27001 controls; nist special publication 800-53 revision 4; appendix e methodologies, guidelines and tools; methodologies; other guidelines and tools; appendix f templates; appendix g hmg cyber security guidelines; hmg cyber essentials scheme; 10 steps to cyber security; appendix h references and further reading; primary uk legislation; good practice guidelines; other reference material; cesg certified professional scheme; other uk government publications; risk management methodologies 
505 0 |a Strategic risk optionstactical risk management controls; operational risk management controls; examples of critical controls and control categories; 8 risk reporting and presentation; business cases; risk treatment decision-making; risk treatment planning and implementation; business continuity and disaster recovery; 9 communication, consultation, monitoring and review; communication; consultation; risk reviews and monitoring; 10 the cesg ia certification scheme; the cesg ia certification scheme; skills framework for the information age (sfia); the iisp information security skills framework 
653 |a Technologie de l'information / Gestion 
653 |a BUSINESS & ECONOMICS / Management Science / bisacsh 
653 |a Computing & information technology / bicssc 
653 |a Risk management / fast 
653 |a Business & Management / thema 
653 |a BUSINESS & ECONOMICS / Management / bisacsh 
653 |a Risk management / http://id.loc.gov/authorities/subjects/sh85114200 
653 |a Gestion du risque 
653 |a Computer security / bicssc 
653 |a Computer security / thema 
653 |a Information technology / Management / fast 
653 |a Enterprise software / thema 
653 |a BUSINESS & ECONOMICS / Organizational Behavior / bisacsh 
653 |a risk management / aat 
653 |a Knowledge management / thema 
653 |a Information technology / Management / http://id.loc.gov/authorities/subjects/sh2008006980 
653 |a BUSINESS & ECONOMICS / Industrial Management / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 1780172672 
776 |z 1780172664 
776 |z 9781780172651 
776 |z 9781780172675 
776 |z 9781780172668 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781780172651/?ar  |x Verlag  |3 Volltext 
082 0 |a 368 
082 0 |a 670 
082 0 |a 658.4038 
082 0 |a 658 
082 0 |a 658.4038 
082 0 |a 500 
082 0 |a 302.3 
082 0 |a 300 
082 0 |a 658.155 
082 0 |a 330 
520 |a This book provides a practical guide to implementing an information risk management process. The author takes you logically through the steps required to identify, assess and manage information risks within an organisation. Each step is explained clearly, supported by several generic examples, such as examples of threats and vulnerabilities, as well as the types of controls to treat risk. Ways of presenting the risks, as well as supporting business cases, are also discussed. Other topics include: coverage of the CESG scheme, HMG security-related documents, such as the security policy framework and UK Government security classification scheme, typical threats and hazards, typical vulnerabilities, risk controls, methodologies and tools, and templates. There are references throughout to any appropriate standards, such as ISO27001 and ISO27005. --