000 03165cam a2200349 i 4500
999 _c10559
_d10559
005 20221220141006.0
008 200219t20162016flua b 001 0 eng
020 _a9781498740548
020 _a1498740545
040 _aUISEK-EC
_beng
_c
_e
_d
100 1 _aKohnke, Anne
_95460
_eaut
245 1 4 _aThe complete guide to cybersecurity risks and controls /
_cAnne Kohnke, Dan Shoemaker, Ken Sigler.
264 1 _aBoca Raton :
_bCRC Press, Taylor & Francis Group,
_c2016
300 _axv, 326 páginas :
_bilustraciones ;
_c25 cm.
336 _atxt
337 _2rdamedia
_an
338 _2rdacarrier
_anc
490 0 _aInternal audit and IT audit
_95461
500 _a"An Auerbach book."
504 _aIncluye bibliografía
505 2 _aWhy cybersecurity management is important - Computing and culture shock - Control-based information governance, what it is and how it works - The value of formal control - A survey of control frameworks, general structure, and application - What is information security governance? - IT governance frameworks-an overview - IT security controls - What are controls and why are they important? - Picking up where chapter 1 left off - Goal-based security controls - Implementation-based security controls - the security control formulation and development process - Setting the stage for control implementation through security architecture design - Implementing a multitiered governance and control framework in a business - Constructing practical systems of controls - Practical implementation: how to establish a real, working control framework - Ensuring long-term control capability - Risk management and prioritization using a control perspective - Ensuring that risk management process supports the organization - the five elements of the risk management process - Control formulation and implementation process - The control formulation process - Creating and documenting control objectives - Creating a management-level control process - Assessing control performance - Measurement-based assurance of controls - Assessing and remediating the control environment - Developing a comprehensive ICT control program - Security control validation and verification - Security control assessment fundamentals - NIST security control assessment process - Control testing and examination application - Control framework sustainment and security of operations - Operational control assurance: aligning purpose with practice - Operational assurance (sensing) – Analysis - Response Management (Responding) - Operational oversight and infrastructure assurance of control set integrity.
526 _aM. de ciberseguridad
700 1 _aShoemaker, Dan
_95464
_eaut
700 1 _aSigler, Kenneth,
_95465
_eaut
082 0 4 _a005.8
_bK796c 2016
650 1 7 _aSeguridad en computadores
_2lemb
_91215
650 2 7 _aRiesgo
_xMedidas de seguridad
_2lemb
_94760
650 2 0 _aTecnología de la información
_911469
942 _cBK
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg