Biblioteca UISEK

Catálogo en línea

Imagen de portada de Amazon
Imagen de Amazon.com

The complete guide to cybersecurity risks and controls / Anne Kohnke, Dan Shoemaker, Ken Sigler.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Internal audit and IT auditEditor: Boca Raton : CRC Press, Taylor & Francis Group, 2016Descripción: xv, 326 páginas : ilustraciones ; 25 cmTipo de contenido:
  • texto
Tipo de medio:
  • no mediado
Tipo de soporte:
  • volumen
ISBN:
  • 9781498740548
  • 1498740545
Tema(s): Clasificación CDD:
  • 005.8 K796c 2016
Contenidos parciales:
Why cybersecurity management is important - Computing and culture shock - Control-based information governance, what it is and how it works - The value of formal control - A survey of control frameworks, general structure, and application - What is information security governance? - IT governance frameworks-an overview - IT security controls - What are controls and why are they important? - Picking up where chapter 1 left off - Goal-based security controls - Implementation-based security controls - the security control formulation and development process - Setting the stage for control implementation through security architecture design - Implementing a multitiered governance and control framework in a business - Constructing practical systems of controls - Practical implementation: how to establish a real, working control framework - Ensuring long-term control capability - Risk management and prioritization using a control perspective - Ensuring that risk management process supports the organization - the five elements of the risk management process - Control formulation and implementation process - The control formulation process - Creating and documenting control objectives - Creating a management-level control process - Assessing control performance - Measurement-based assurance of controls - Assessing and remediating the control environment - Developing a comprehensive ICT control program - Security control validation and verification - Security control assessment fundamentals - NIST security control assessment process - Control testing and examination application - Control framework sustainment and security of operations - Operational control assurance: aligning purpose with practice - Operational assurance (sensing) – Analysis - Response Management (Responding) - Operational oversight and infrastructure assurance of control set integrity.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Libro Miguel de Cervantes Sala general 005.8 K796c 2016 (Navegar estantería(Abre debajo)) Ej.1 Disponible 00015705

"An Auerbach book."

Incluye bibliografía

Why cybersecurity management is important - Computing and culture shock - Control-based information governance, what it is and how it works - The value of formal control -
A survey of control frameworks, general structure, and application - What is information security governance? - IT governance frameworks-an overview - IT security controls - What are controls and why are they important? - Picking up where chapter 1 left off - Goal-based security controls - Implementation-based security controls - the security control formulation and development process - Setting the stage for control implementation through security architecture design - Implementing a multitiered governance and control framework in a business - Constructing practical systems of controls - Practical implementation: how to establish a real, working control framework - Ensuring long-term control capability -
Risk management and prioritization using a control perspective - Ensuring that risk management process supports the organization - the five elements of the risk management process - Control formulation and implementation process - The control formulation process - Creating and documenting control objectives - Creating a management-level control process - Assessing control performance - Measurement-based assurance of controls - Assessing and remediating the control environment - Developing a comprehensive ICT control program - Security control validation and verification - Security control assessment fundamentals - NIST security control assessment process - Control testing and examination application - Control framework sustainment and security of operations - Operational control assurance: aligning purpose with practice - Operational assurance (sensing) – Analysis - Response Management (Responding) - Operational oversight and infrastructure assurance of control set integrity.

M. de ciberseguridad

No hay comentarios en este titulo.

para colocar un comentario.

Con tecnología Koha