Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by David Sutton
Information Risk Management, 2nd Edition
Front Cover
Half-Title Page
BCS, The Chartered Institute for It
Title Page
Copyright Page
Dedication
Contents
List of figures and tables
Author
Other works by the author
Acknowledgements
Abbreviations
Preface
1. The Need for Information Risk Management
2. Review of Information Security Fundamentals
3. The Information Risk Management Programme
4. Risk Identification
5. Threat and Vulnerability Assessment
6. Risk Analysis and Risk Evaluation
7. Risk Treatment
8. Risk Reporting and Presentation
9. Communication, Consultation, Monitoring and Review
10. The NCSC Certified Professional Scheme
11. HMG Security-Related Documents
Appendix A – Taxonomies and Descriptions
Appendix B – Typical Threats and Hazards
Appendix C – Typical Vulnerabilities
Appendix D – Information Risk Controls
Appendix E – Methodologies, Guidelines and Tools
Appendix F – Templates
Appendix G – Hmg Cybersecurity Guidelines
Appendix H – References and Further Reading
Appendix I – Definitions, standards and glossary of terms
Index
Back Cover
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
BCS, The Chartered Institute for It
Next
Next Chapter
Copyright Page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset