Risk management for computer security : Protecting your network and information assets /

Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program

Bibliographic Details
Main Author: Jones, Andy, 1952-
Other Authors: Ashenden, Debi
Format: Government Document Book
Language:English
Published: Amsterdam, Netherlands ; Boston : Elsevier Butterworth-Heinemann, ©2005
Amsterdam, Netherlands ; Boston : ©2005
Subjects:
Table of Contents:
  • Cover
  • Copyright Page
  • Contents
  • Foreword
  • Preface
  • Acknowledgments
  • About the Authors
  • Section I: An Introduction to Risk Management
  • Chapter 1. Introduction to the Theories of Risk Management
  • Chapter 2. The Changing Environment
  • Chapter 3. The Art of Managing Risks
  • Section II: The Threat Assessment Process
  • Chapter 4. Threat Assessment and Its Input to Risk Assessment
  • Chapter 5. Threat Assessment Method
  • Chapter 6. Example Threat Assessment
  • Section III: Vulnerability Issues
  • Chapter 7. Operating System Vulnerabilities
  • Chapter 8. Application Vulnerabilities
  • Chapter 9. Public Domain or Commercial Off-the-Shelf Software?
  • Chapter 10. Connectivity and Dependence
  • Section IV: The Risk Process
  • Chapter 11. What Is Risk Assessment?
  • Chapter 12. Risk Analysis
  • Chapter 13. Who Is Responsible?
  • Section V: Tools and Types of Risk Assessment
  • Chapter 14. Qualitative and Quantitative Risk Assessment
  • Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management
  • Chapter 16. Tools and Techniques
  • Chapter 17. Integrated Risk Management
  • Section VI: Future Directions
  • Chapter 18. The Future of Risk Management
  • Index
  • Last Page