Dewey Decimal005.8
Table Of ContentPart1 Risk Management Business Challenges Chapter1 Risk Management Fundamentals Chapter2 Managing Risk: Threats, Vulnerabilities, and Exploits Chapter3 Maintaining Compliance Chapter4 Developing a Risk Management Plan Part2 Mitigating Risks Chapter5 Defining Risk Assessment Approaches Chapter6 Performing a Risk Assessment Chapter7 Identifying Assets and Activities to Be Protected Chapter8 Identifying and Analyzing Threats, Vulnerabilities, and Exploits Chapter9 Identifying and Analyzing Risk Mitigation Security Controls Chapter10 Planning Risk Mitigation Throughout Your Organization Chapter11 Turning Your Risk Assessment into a Risk Mitigation Plan Part3 Risk Mitigation Plans Chapter12 Mitigating Risk with a Business Impact Analysis Chapter13 Mitigating Risk with a Business Continuity Plan Chapter14 Mitigating Risk with a Disaster Recovery Plan Chapter15 Mitigating Risk with a Computer Incident Response Team Plan
Edition DescriptionRevised edition
SynopsisPART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Managing Risk in Information Systems provides a unique, in-depth look at how to manage and reduce IT associated risks. Written by an industry expert, this book provides a comprehensive explanation of the SSCP® Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Using examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk., Managing Risk in Information Systems, Third Edition provides a comprehensive overview of risk management and its implications on IT infrastructures and compliance. This new edition addresses risk across entire Information Systems, including Data, People, Processes, and Technology. Written by industry experts, and using a wealth of examples and exercises, this text incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk. Available with new Cybersecurity Cloud Labs, which provide immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills Includes the latest information on new and emerging topics such as Cloud Computing, Mobile Computing, Artificial Intelligence, Machine Learning, and more Provides a modern and comprehensive view of information security policies and frameworks Examines the technical knowledge and software skills required for policy implementation Explores the creation of an effective IT security policy framework Updated with the latest coverage of GDPR, COBIT, CVE, and NIST Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more. © 2022 437 pages, Managing Risk in Information Systems, Third Edition provides a comprehensive overview of risk management and its implications on IT infrastructures and compliance. This new edition addresses risk across entire Information Systems, including Data, People, Processes, and Technology. Written by industry experts, and using a wealth of examples and exercises, this text incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk. Available with new Cybersecurity Cloud Labs, which provide immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills Includes the latest information on new and emerging topics such as Cloud Computing, Mobile Computing, Artificial Intelligence, Machine Learning, and more Provides a modern and comprehensive view of information security policies and frameworks Examines the technical knowledge and software skills required for policy implementation Explores the creation of an effective IT security policy framework Updated with the latest coverage of GDPR, COBIT, CVE, and NIST Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more. (c) 2022 437 pages