000 | 03165cam a2200349 i 4500 | ||
---|---|---|---|
999 |
_c10559 _d10559 |
||
005 | 20221220141006.0 | ||
008 | 200219t20162016flua b 001 0 eng | ||
020 | _a9781498740548 | ||
020 | _a1498740545 | ||
040 |
_aUISEK-EC _beng _c _e _d |
||
100 | 1 |
_aKohnke, Anne _95460 _eaut |
|
245 | 1 | 4 |
_aThe complete guide to cybersecurity risks and controls / _cAnne Kohnke, Dan Shoemaker, Ken Sigler. |
264 | 1 |
_aBoca Raton : _bCRC Press, Taylor & Francis Group, _c2016 |
|
300 |
_axv, 326 páginas : _bilustraciones ; _c25 cm. |
||
336 | _atxt | ||
337 |
_2rdamedia _an |
||
338 |
_2rdacarrier _anc |
||
490 | 0 |
_aInternal audit and IT audit _95461 |
|
500 | _a"An Auerbach book." | ||
504 | _aIncluye bibliografía | ||
505 | 2 | _aWhy cybersecurity management is important - Computing and culture shock - Control-based information governance, what it is and how it works - The value of formal control - A survey of control frameworks, general structure, and application - What is information security governance? - IT governance frameworks-an overview - IT security controls - What are controls and why are they important? - Picking up where chapter 1 left off - Goal-based security controls - Implementation-based security controls - the security control formulation and development process - Setting the stage for control implementation through security architecture design - Implementing a multitiered governance and control framework in a business - Constructing practical systems of controls - Practical implementation: how to establish a real, working control framework - Ensuring long-term control capability - Risk management and prioritization using a control perspective - Ensuring that risk management process supports the organization - the five elements of the risk management process - Control formulation and implementation process - The control formulation process - Creating and documenting control objectives - Creating a management-level control process - Assessing control performance - Measurement-based assurance of controls - Assessing and remediating the control environment - Developing a comprehensive ICT control program - Security control validation and verification - Security control assessment fundamentals - NIST security control assessment process - Control testing and examination application - Control framework sustainment and security of operations - Operational control assurance: aligning purpose with practice - Operational assurance (sensing) – Analysis - Response Management (Responding) - Operational oversight and infrastructure assurance of control set integrity. | |
526 | _aM. de ciberseguridad | ||
700 | 1 |
_aShoemaker, Dan _95464 _eaut |
|
700 | 1 |
_aSigler, Kenneth, _95465 _eaut |
|
082 | 0 | 4 |
_a005.8 _bK796c 2016 |
650 | 1 | 7 |
_aSeguridad en computadores _2lemb _91215 |
650 | 2 | 7 |
_aRiesgo _xMedidas de seguridad _2lemb _94760 |
650 | 2 | 0 |
_aTecnología de la información _911469 |
942 | _cBK | ||
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |