Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Security Risk Management -  Evan Wheeler

Security Risk Management (eBook)

Building an Information Security Risk Management Program from the Ground Up

(Autor)

eBook Download: PDF | EPUB
2011 | 1. Auflage
360 Seiten
Elsevier Science (Verlag)
978-1-59749-616-2 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
38,95 inkl. MwSt
(CHF 37,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for managing security risks. This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program. This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs. - Named a 2011 Best Governance and ISMS Book by InfoSec Reviews - Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment - Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk - Presents a roadmap for designing and implementing a security risk management program

Evan Wheeler currently is a Director of Information Security for Omgeo (A DTCC | Thomson Reuters Company), an instructor at both Clark and Northeastern Universities, and the author of the Information Security Risk Management course for the SANS Institute. Previously he spent six years as a Security Consultant for the U.S. Department of Defense.
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for managing security risks. This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program. This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs. - Named a 2011 Best Governance and ISMS Book by InfoSec Reviews- Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment- Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk- Presents a roadmap for designing and implementing a security risk management program

Front Cover 1
Security Risk Management: Building an InformationSecurity Risk Management Program from the Ground Up 4
Copyright 5
Table of Contents 6
Preface 14
Intended Audience 15
Organization of This Book 16
Acknowledgments 20
About the Author 21
About the Technical Editor 21
Part I: Introduction to Risk Management 22
Chapter 1. The Security Evolution 24
Introduction 24
How We Got Here 24
A Risk-Focused Future 27
Information Security Fundamentals 29
The Death of Information Security 37
Summary 40
References 40
Chapter 2. Risky Business 42
Introduction 42
Applying Risk Management to Information Security 42
Business-Driven Security Program 49
Security as an Investment 55
Qualitative versus Quantitative 58
Summary 61
References 62
Chapter 3. The Risk Management Lifecycle 64
Introduction 64
Stages of the Risk Management Lifecycle 64
Business Impact Assessment 69
A Vulnerability Assessment Is Not a Risk Assessment 71
Making Risk Decisions 74
Mitigation Planning and Long-Term Strategy 77
Process Ownership 80
Summary 81
Part II: Risk Assessment and AnalysisTechniques 82
Chapter 4. Risk Profiling 84
Introduction 84
How Risk Sensitivity Is Measured 84
Asking the Right Questions 92
Assessing Risk Appetite 102
Summary 105
Reference 106
Chapter 5. Formulating a Risk 108
Introduction 108
Breaking Down a Risk 108
Who or What Is the Threat? 116
Summary 123
References 124
Chapter 6. Risk Exposure Factors 126
Introduction 126
Qualitative Risk Measures 126
Risk Assessment 138
Summary 145
Reference 146
Chapter 7. Security Controls and Services 148
Introduction 148
Fundamental Security Services 148
Recommended Controls 165
Summary 166
Reference 167
Chapter 8. Risk Evaluation and Mitigation Strategies 168
Introduction 168
Risk Evaluation 168
Risk Mitigation Planning 175
Policy Exceptions and Risk Acceptance 177
Summary 182
Chapter 9. Reports and Consulting 184
Introduction 184
Risk Management Artifacts 184
A Consultant’s Perspective 186
Writing Audit Responses 204
Summary 208
References 209
Chapter 10. Risk Assessment Techniques 210
Introduction 210
Operational Assessments 210
Project-Based Assessments 219
Third-Party Assessments 226
Summary 232
References 233
Part III: Building and Running a Risk Management Program 234
Chapter 11. Threat and Vulnerability Management 236
Introduction 236
Building Blocks 236
Threat Identification 241
Advisories and Testing 243
An Efficient Workflow 249
The FAIR Approach 251
Summary 257
References 258
Chapter 12. Security Risk Reviews 260
Introduction 260
Assessing the State of Compliance 260
Implementing a Process 263
Process Optimization: A Review of Key Points 272
The NIST Approach 274
Summary 278
References 278
Chapter 13. A Blueprint for Security 280
Introduction 280
Risk in the Development Lifecycle 280
Security Architecture 284
Patterns and Baselines 294
Architectural Risk Analysis 299
Summary 304
Reference 305
Chapter 14. Building a Program from Scratch 306
Introduction 306
Designing a Risk Program 306
Prerequisites for a Risk Management Program 312
Risk at the Enterprise Level 316
Linking the Program Components 319
Program Roadmap 321
Summary 323
Reference 323
Appendix A: Sample Security Risk Profile 324
A. General Information 324
B. Information Sensitivity 324
C Regulatory Requirements 327
D. Business Requirements 328
E. Definitions 329
Appendix B: Qualitative Risk Scale Reference Tables 330
Appendix C: Architectural Risk Analysis Reference Tables 334
Baseline Security Levels and Sample Controls 334
Security Enhancement Levels and Sample Controls 340
Mapping Security Levels 348
Index 352

Erscheint lt. Verlag 20.4.2011
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
Wirtschaft Betriebswirtschaft / Management Wirtschaftsinformatik
ISBN-10 1-59749-616-2 / 1597496162
ISBN-13 978-1-59749-616-2 / 9781597496162
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 3,2 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 2,9 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95