IT security risk control management : an audit preparation plan / Raymond Pompon.

Por: Pompon, Raymond [autor]Tipo de material: TextoTextoIdioma: Inglés Editor: Seattle, Washington : Apress, c2016Fecha de copyright: ©2016Descripción: xxxi, 311 páginas : figuras ; 26 cmTipo de contenido: texto Tipo de medio: sin mediación Tipo de portador: volumenISBN: 978144221396; 9781484221402Tema(s): Computadores -- Seguridad | Seguridad de la información | Tecnologías de la información -- AdministraciónClasificación CDD: 005.8
Contenidos:
Part I: Getting a Handle on Things Chapter 1. Why Audit Chapter 2. Assume Breach. Chapter 3. Risk Analysis Assets and Impacts Chapter 4: Risk Analysis: Natural Threats. Chapter 5: Risk Analysis: Adversarial Risk. Part II: Wrangling the Organization -- Chapter 6: Scope. Chapter 7: Governance. Chapter 8: Talking to the Suits. Chapter 9: Talking to the Techs. Chapter 10: Talking to the Users. Part III: Managing Risk with Controls -- Chapter 11: Policy. Chapter 12: Control Design. Chapter 13: Administrative Controls. Chapter 14: Vulnerability Management. Chapter 15: People Controls. Chapter 16: Logical Access Control. Chapter 17: Network Security Controls. Chapter 18: More Technical Controls. Chapter 19: Physical Security Controls. Part IV: Being Audited.-Chapter 20: Response Controls. Chapter 21: Starting the Audit. Chapter 22: Internal Audit. Chapter 23: Third Party Security. Chapter 24: Post Audit Improvement.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Signatura Copia número Estado Fecha de vencimiento Código de barras
Libros Libros Biblioteca Central
005.8 P791 2016 (Navegar estantería(Abre debajo)) Ej. 1 Disponible 32060

Incluye índice.

Part I: Getting a Handle on Things Chapter 1. Why Audit Chapter 2. Assume Breach. Chapter 3. Risk Analysis Assets and Impacts Chapter 4: Risk Analysis: Natural Threats. Chapter 5: Risk Analysis: Adversarial Risk. Part II: Wrangling the Organization -- Chapter 6: Scope. Chapter 7: Governance. Chapter 8: Talking to the Suits. Chapter 9: Talking to the Techs. Chapter 10: Talking to the Users. Part III: Managing Risk with Controls -- Chapter 11: Policy. Chapter 12: Control Design. Chapter 13: Administrative Controls. Chapter 14: Vulnerability Management. Chapter 15: People Controls. Chapter 16: Logical Access Control. Chapter 17: Network Security Controls. Chapter 18: More Technical Controls. Chapter 19: Physical Security Controls. Part IV: Being Audited.-Chapter 20: Response Controls. Chapter 21: Starting the Audit. Chapter 22: Internal Audit. Chapter 23: Third Party Security. Chapter 24: Post Audit Improvement.

Ingeniería de Sistemas

No hay comentarios en este titulo.

para colocar un comentario.

Haga clic en una imagen para verla en el visor de imágenes

footer