Search UDS Library Collections


Image from Google Jackets

Information risk management : a practitioner's guide /David Sutton.

By: Material type: TextTextPublisher: Swindon, UK : BCS Learning & Development Ltd, a wholly owned subsidiary of BCS The Chartered Institute for IT, [2014]Copyright date: c2014Description: xxxi, 210 p.; illustrations 24cmContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781780172668
  • 9781780172675
  • 9781780172682
Subject(s): Genre/Form: DDC classification:
  • 004.0684 23
LOC classification:
  • T 58.64 S81
Online resources: Summary: This book provides a practical guide to implementing an information risk management process. The author takes you logically through the steps required to identify, assess and manage information risks within an organisation. Each step is explained clearly, supported by several generic examples, such as examples of threats and vulnerabilities, as well as the types of controls to treat risk. Ways of presenting the risks, as well as supporting business cases, are also discussed. Other topics include: coverage of the CESG scheme, HMG security-related documents, such as the security policy framework and UK Government security classification scheme, typical threats and hazards, typical vulnerabilities, risk controls, methodologies and tools, and templates. There are references throughout to any appropriate standards, such as ISO27001 and ISO27005. -- Edited summary from book.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Includes bibliographical references and index.

This book provides a practical guide to implementing an information risk management process. The author takes you logically through the steps required to identify, assess and manage information risks within an organisation. Each step is explained clearly, supported by several generic examples, such as examples of threats and vulnerabilities, as well as the types of controls to treat risk. Ways of presenting the risks, as well as supporting business cases, are also discussed. Other topics include: coverage of the CESG scheme, HMG security-related documents, such as the security policy framework and UK Government security classification scheme, typical threats and hazards, typical vulnerabilities, risk controls, methodologies and tools, and templates. There are references throughout to any appropriate standards, such as ISO27001 and ISO27005. -- Edited summary from book.

Online resource; title from title screen (Books24x7.com, viewed June 26, 2015).

There are no comments on this title.

to post a comment.