Managing Risk in Information Systems, Second Edition

  • 9h 50m
  • Darril Gibson
  • Jones and Bartlett Learning
  • 2015

Revised and updated with the latest data in the field, the Second Edition of Managing Risk in Information Systems provides a comprehensive overview of the SSCP Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Written by industry experts, and using a wealth of examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk.

Features & Benefits

  • Provides a modern and comprehensive view of information security policies and frameworks
  • Examines the technical knowledge and software skills required for policy implementation
  • Explores the creation of an effective IT security policy framework
  • Discusses the latest governance, regulatory mandates, business drives, legal considerations, and much more.

About the Author

Darril Gibson is an IT trainer who regularly teaches security topics to Air Force personnel. An adjunct professor, he’s written or co-authored several IT books, including CompTIA Security+: Get Certified Get Ahead, and Mastering Windows Server 2008 R2. In addition, he’s also created training videos on multiple topics for Keystone Learning. Mr. Gibson holds numerous certifications, including (ISC)2 CISSP and CompTIA Security+. He’s also been a Microsoft Certified Trainer since 1999.

In this Book

  • Risk Management Fundamentals
  • Managing Risk: Threats, Vulnerabilities, and Exploits
  • Maintaining Compliance
  • Developing a Risk Management Plan
  • Defining Risk Assessment Approaches
  • Performing a Risk Assessment
  • Identifying Assets and Activities to Be Protected
  • Identifying and Analyzing Threats, Vulnerabilities, and Exploits
  • Identifying and Analyzing Risk Mitigation Security Controls
  • Planning Risk Mitigation Throughout Your Organization
  • Turning Your Risk Assessment into a Risk Mitigation Plan
  • Mitigating Risk with a Business Impact Analysis
  • Mitigating Risk with a Business Continuity Plan
  • Mitigating Risk with a Disaster Recovery Plan
  • Mitigating Risk with a Computer Incident Response Team Plan
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.3 of 6 users Rating 4.3 of 6 users (6)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.5 of 193 users Rating 4.5 of 193 users (193)