000 02140cam a22003494a 4500
001 13785531
003 TLU
005 20220511090057.0
008 041118s2005 flua b 001 0 eng
020 _a0849333466
020 _a9780849333460
041 _aeng
082 0 0 _a005.8
100 1 _aPeltier, Thomas R.
245 1 0 _aInformation security risk analysis
250 _a2nd ed.
260 _aBoca Raton :
_bAuerbach Publications,
300 _axvi, 344 p. :
_bill. ;
_c24 cm.
490 _aMã học phần IS345
504 _aIncludes bibliographical references and index.
520 _aThe risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This crucial process should not be a long, drawn-out affair. To be effective, it must be done quickly and efficiently. Information Security Risk Analysis, Second Edition enables CIOs, CSOs, and MIS managers to understand when, why, and how risk assessments and analyses can be conducted effectively. This book discusses the principle of risk management and its three key elements: risk analysis, risk assessment, and vulnerability assessment. It examines the differences between quantitative and qualitative risk assessment, and details how various types of qualitative risk assessment can be applied to the assessment process. The text offers a thorough discussion of recent changes to FRAAP and the need to develop a pre-screening method for risk assessment and business impact analysis.
650 0 _aComputer security.
650 0 _aComputer networks
650 0 _aRisk assessment.
653 _aBảo mật máy tính
653 _aMạng máy tính
653 _aPhân tích rủi ro
653 _aAn ninh thông tin
856 4 2 _uhttp://thuvien.thanglong.edu.vn:8080/dspace/handle/TLU-123456789/3019
910 _bThuan
942 _2ddc
999 _c14488