Information Security Risk Analysis

Information Security Risk Analysis

by ThomasR.Peltier (Author)

Synopsis

Risk is a cost of doing business. The question is, What are the risks, and what are their costs? Knowing the vulnerabilities and threats that face your organization's information and systems is the first essential step in risk management.

Information Security Risk Analysis shows you how to use cost-effective risk analysis techniques to identify and quantify the threats--both accidental and purposeful--that your organization faces. The book steps you through the qualitative risk analysis process using techniques such as PARA (Practical Application of Risk Analysis) and FRAP (Facilitated Risk Analysis Process) to:

  • Evaluate tangible and intangible risks
  • Use the qualitative risk analysis process
  • Identify elements that make up a strong Business Impact Analysis
  • Conduct risk analysis with confidence

    Management looks to you, its information security professional, to provide a process that allows for the systematic review of risk, threats, hazards, and concerns, and to provide cost-effective measures to lower risk to an acceptable level. You can find books that cover risk analysis for financial, environmental, and even software projects, but you will find none that apply risk analysis to information technology and business continuity planning or deal with issues of loss of systems configuration, passwords, information loss, system integrity, CPU cycles, bandwidth, and more. Information Security Risk Analysis shows you how to determine cost effective solutions for your organization's information technology.
  • $7.53

    Save:$50.75 (87%)

    Quantity

    Temporarily out of stock

    More Information

    Format: Paperback
    Pages: 296
    Edition: 1
    Publisher: Auerbach Publications
    Published: 23 Jan 2001

    ISBN 10: 0849308801
    ISBN 13: 9780849308802

    Media Reviews
    Introduces risk analysis techniques that can be used to identify and quantify both accidental and malicious threats to computer systems within an organization. -Sci Tech Book News, Vol. 25, No. 3, September 2001 This book has radically influenced my approach to security risk managementFrom the beginning this book grabs your attentionif you purchase this book for the tables and checklists alone you would be getting a bargainIf you perform security risk analysis, or business continuity or disaster recovery planning this book is 'must reading'earns a solid 5 stars and Mr. Peltier earns my gratitude for showing me a better way. --Mike Tarrani, on Amazon.com