Information Risk Management :A practitioner's guide ( 1 )

Publication subTitle :A practitioner's guide

Publication series :1

Author: Sutton   David  

Publisher: BCS Learning & Development Limited‎

Publication year: 2014

E-ISBN: 9781780172668

P-ISBN(Paperback): 9781780172651

Subject: G202 information processing technology

Keyword: 安全保密,计算技术、计算机技术,经济计划与管理

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book provides practical guidance to the principles and development of a strategic approach to an IRM programme. The only textbook for the BCS Practitioner Certificate in Information Risk Management.

Chapter

AUTHOR

ACKNOWLEDGMENTS

ABBREVIATIONS

DEFINITIONS, STANDARDS AND GLOSSARY OF TERMS

PREFACE

1 THE NEED FOR INFORMATION RISK MANAGEMENT

INTRODUCTION

WHAT IS INFORMATION?

THE INFORMATION LIFE CYCLE

WHO SHOULD USE INFORMATION RISK MANAGEMENT?

THE LEGAL FRAMEWORK

THE CONTEXT OF RISK IN THE ORGANISATION

THE BENEFITS OF TAKING ACCOUNT OF INFORMATION RISK

OVERVIEW OF THE INFORMATION RISK MANAGEMENT PROCESS

2 REVIEW OF INFORMATION SECURITY FUNDAMENTALS

INFORMATION CLASSIFICATION

PLAN, DO, CHECK, ACT

3 THE INFORMATION RISK MANAGEMENT PROGRAMME

GOALS, SCOPE AND OBJECTIVES

ROLES AND RESPONSIBILITIES

GOVERNANCE OF THE RISK MANAGEMENT PROGRAMME

INFORMATION RISK MANAGEMENT CRITERIA

4 RISK IDENTIFICATION

THE APPROACH TO RISK IDENTIFICATION

IMPACT ASSESSMENT

TYPES OF IMPACT

QUALITATIVE AND QUANTITATIVE ASSESSMENTS

5 THREAT AND VULNERABILITY ASSESSMENT

CONDUCTING THREAT ASSESSMENTS

CONDUCTING VULNERABILITY ASSESSMENTS

IDENTIFICATION OF EXISTING CONTROLS

6 RISK ANALYSIS AND RISK EVALUATION

ASSESSMENT OF LIKELIHOOD

RISK ANALYSIS

RISK EVALUATION

7 RISK TREATMENT

STRATEGIC RISK OPTIONS

TACTICAL RISK MANAGEMENT CONTROLS

OPERATIONAL RISK MANAGEMENT CONTROLS

EXAMPLES OF CRITICAL CONTROLS AND CONTROL CATEGORIES

8 RISK REPORTING AND PRESENTATION

BUSINESS CASES

RISK TREATMENT DECISION-MAKING

RISK TREATMENT PLANNING AND IMPLEMENTATION

BUSINESS CONTINUITY AND DISASTER RECOVERY

9 COMMUNICATION, CONSULTATION, MONITORING AND REVIEW

COMMUNICATION

CONSULTATION

RISK REVIEWS AND MONITORING

10 THE CESG IA CERTIFICATION SCHEME

THE CESG IA CERTIFICATION SCHEME

SKILLS FRAMEWORK FOR THE INFORMATION AGE (SFIA)

THE IISP INFORMATION SECURITY SKILLS FRAMEWORK

11 HMG SECURITY-RELATED DOCUMENTS

HMG SECURITY POLICY FRAMEWORK

UK GOVERNMENT SECURITY CLASSIFICATIONS

APPENDIX A TAXONOMIES AND DESCRIPTIONS

INFORMATION RISK

TYPICAL IMPACTS OR CONSEQUENCES

APPENDIX B TYPICAL THREATS AND HAZARDS

MALICIOUS INTRUSION (HACKING)

ENVIRONMENTAL THREATS

ERRORS AND FAILURES

SOCIAL ENGINEERING

MISUSE AND ABUSE

PHYSICAL THREATS

MALWARE

APPENDIX C TYPICAL VULNERABILITIES

ACCESS CONTROL

POOR PROCEDURES

PHYSICAL AND ENVIRONMENTAL SECURITY

COMMUNICATIONS AND OPERATIONS MANAGEMENT

PEOPLE-RELATED SECURITY FAILURES

APPENDIX D INFORMATION RISK CONTROLS

STRATEGIC CONTROLS

TACTICAL CONTROLS

OPERATIONAL CONTROLS

CRITICAL SECURITY CONTROLS VERSION 5.0

ISO/IEC 27001 CONTROLS

NIST SPECIAL PUBLICATION 800-53 REVISION 4

APPENDIX E METHODOLOGIES, GUIDELINES AND TOOLS

METHODOLOGIES

OTHER GUIDELINES AND TOOLS

APPENDIX F TEMPLATES

APPENDIX G HMG CYBER SECURITY GUIDELINES

HMG CYBER ESSENTIALS SCHEME

10 STEPS TO CYBER SECURITY

APPENDIX H REFERENCES AND FURTHER READING

PRIMARY UK LEGISLATION

GOOD PRACTICE GUIDELINES

OTHER REFERENCE MATERIAL

CESG CERTIFIED PROFESSIONAL SCHEME

OTHER UK GOVERNMENT PUBLICATIONS

RISK MANAGEMENT METHODOLOGIES

NEWS ARTICLES ETC.

UK AND INTERNATIONAL STANDARDS

INDEX

Back Cover

The users who browse this book also browse


No browse record.