Risk Management for Computer Security
eBook - PDF

Risk Management for Computer Security

Protecting Your Network and Information Assets

Andy Jones,Debi Ashenden

  1. 296 pages
  2. English
  3. PDF
  4. Available on iOS & Android
eBook - PDF

Risk Management for Computer Security

Protecting Your Network and Information Assets

Andy Jones,Debi Ashenden

Book details
Table of contents
Citations

About This Book

Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk program for computer security. It presents an integrated how-to approach to implementing a corporate program, complete with tested methods and processes, flowcharts, and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will help professionals in meeting their challenges as we progress through the twenty-first century.

This book is organized into five sections. Section I introduces the reader to the theories of risk management and describes the field's changing environment as well as the art of managing risks. Section II deals with threat assessment and its input to risk assessment; topics covered include the threat assessment method and an example of threat assessment. Section III focuses on operating system vulnerabilities and discusses application vulnerabilities; public domain vs. COTS; and connectivity and dependence. Section IV explains what risk assessment is and Section V explores qualitative vs. quantitative tools and types of risk assessment and concludes with an assessment of the future of risk management.

Corporate security professionals around the world will find this book a highly valuable source of information.

  • Presents material in an engaging, easy-to-follow manner that will appeal to both advanced INFOSEC career professionals and network administrators entering the information security profession
  • Addresses the needs of both the individuals who are new to the subject as well as of experienced professionals
  • Provides insight into the factors that need to be considered and fully explains the numerous methods, processes and procedures of risk management

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Risk Management for Computer Security an online PDF/ePUB?
Yes, you can access Risk Management for Computer Security by Andy Jones,Debi Ashenden in PDF and/or ePUB format, as well as other popular books in Business & Information Management. We have over one million books available in our catalogue for you to explore.

Information

Year
2005
ISBN
9780080491554

Table of contents

  1. Front Cover
  2. Risk Management for Computer Security
  3. Copyright Page
  4. Contents
  5. Foreword
  6. Preface
  7. Acknowledgments
  8. About the Authors
  9. Section I: An Introduction to Risk Management
  10. Section II: The Threat Assessment Process
  11. Section III: Vulnerability Issues
  12. Section IV: The Risk Process
  13. Section V: Tools and Types of Risk Assessment
  14. Section VI: Future Directions
  15. Index
Citation styles for Risk Management for Computer Security

APA 6 Citation

Jones, A., & Ashenden, D. (2005). Risk Management for Computer Security ([edition unavailable]). Elsevier Science. Retrieved from https://www.perlego.com/book/1859441/risk-management-for-computer-security-protecting-your-network-and-information-assets-pdf (Original work published 2005)

Chicago Citation

Jones, Andy, and Debi Ashenden. (2005) 2005. Risk Management for Computer Security. [Edition unavailable]. Elsevier Science. https://www.perlego.com/book/1859441/risk-management-for-computer-security-protecting-your-network-and-information-assets-pdf.

Harvard Citation

Jones, A. and Ashenden, D. (2005) Risk Management for Computer Security. [edition unavailable]. Elsevier Science. Available at: https://www.perlego.com/book/1859441/risk-management-for-computer-security-protecting-your-network-and-information-assets-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Jones, Andy, and Debi Ashenden. Risk Management for Computer Security. [edition unavailable]. Elsevier Science, 2005. Web. 15 Oct. 2022.