Pagina principaleGruppiConversazioniAltroStatistiche
Cerca nel Sito
Questo sito utilizza i cookies per fornire i nostri servizi, per migliorare le prestazioni, per analisi, e (per gli utenti che accedono senza fare login) per la pubblicità. Usando LibraryThing confermi di aver letto e capito le nostre condizioni di servizio e la politica sulla privacy. Il tuo uso del sito e dei servizi è soggetto a tali politiche e condizioni.

Risultati da Google Ricerca Libri

Fai clic su di un'immagine per andare a Google Ricerca Libri.

Sto caricando le informazioni...

Managing Information Security Risks: The OCTAVE (SM) Approach

di Christopher Alberts

UtentiRecensioniPopolaritàMedia votiConversazioni
28Nessuno841,325 (3)Nessuno
Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and risks in this broader context must precede any security implementation to insure that all the relevant, underlying problems are first uncovered. The OCTAVE approach for self-directed security evaluations was developed at the influential CERT(R) Coordination Center. This approach is designed to help you: Identify and rank key information assets Weigh threats to those assets Analyze vulnerabilities involving both technology and practices OCTAVE(SM) enables any organization to develop security priorities based on the organization's particular business concerns. The approach provides a coherent framework for aligning security actions with overall objectives. Managing Information Security Risks , written by the developers of OCTAVE, is the complete and authoritative guide to its principles and implementations. The book: Provides a systematic way to evaluate and manage information security risks Illustrates the implementation of self-directed evaluations Shows how to tailor evaluation methods to different types of organizations Special features of the book include: A running example to illustrate important concepts and techniques A convenient set of evaluation worksheets A catalog of best practices to which organizations can compare their own 0321118863B05172002… (altro)
Nessuno
Sto caricando le informazioni...

Iscriviti per consentire a LibraryThing di scoprire se ti piacerà questo libro.

Attualmente non vi sono conversazioni su questo libro.

Nessuna recensione
nessuna recensione | aggiungi una recensione
Devi effettuare l'accesso per contribuire alle Informazioni generali.
Per maggiori spiegazioni, vedi la pagina di aiuto delle informazioni generali.
Titolo canonico
Titolo originale
Titoli alternativi
Data della prima edizione
Personaggi
Luoghi significativi
Eventi significativi
Film correlati
Epigrafe
Dedica
Incipit
Citazioni
Ultime parole
Nota di disambiguazione
Redattore editoriale
Elogi
Lingua originale
DDC/MDS Canonico
LCC canonico

Risorse esterne che parlano di questo libro

Wikipedia in inglese

Nessuno

Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and risks in this broader context must precede any security implementation to insure that all the relevant, underlying problems are first uncovered. The OCTAVE approach for self-directed security evaluations was developed at the influential CERT(R) Coordination Center. This approach is designed to help you: Identify and rank key information assets Weigh threats to those assets Analyze vulnerabilities involving both technology and practices OCTAVE(SM) enables any organization to develop security priorities based on the organization's particular business concerns. The approach provides a coherent framework for aligning security actions with overall objectives. Managing Information Security Risks , written by the developers of OCTAVE, is the complete and authoritative guide to its principles and implementations. The book: Provides a systematic way to evaluate and manage information security risks Illustrates the implementation of self-directed evaluations Shows how to tailor evaluation methods to different types of organizations Special features of the book include: A running example to illustrate important concepts and techniques A convenient set of evaluation worksheets A catalog of best practices to which organizations can compare their own 0321118863B05172002

Non sono state trovate descrizioni di biblioteche

Descrizione del libro
Riassunto haiku

Discussioni correnti

Nessuno

Copertine popolari

Link rapidi

Voto

Media: (3)
0.5
1
1.5
2
2.5
3 1
3.5
4
4.5
5

Sei tu?

Diventa un autore di LibraryThing.

 

A proposito di | Contatto | LibraryThing.com | Privacy/Condizioni d'uso | Guida/FAQ | Blog | Negozio | APIs | TinyCat | Biblioteche di personaggi celebri | Recensori in anteprima | Informazioni generali | 205,386,277 libri! | Barra superiore: Sempre visibile