Describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them. This book addresses a systematic approach to logical decision-making about the allocation of scarce security resources.
Describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them. This book addresses a systematic approach to logical decision-making about the allocation of scarce security resources.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Risk Management: A Short History and its Importance Key Terms and Definitions Risk Management Process Overview Asset Identification Threat Identification and Assessment Conducting the Site Specific Threat Assessment Vulnerability Identification and Assessment The Risk Assessment The Risk Assessment Cost-Benefit Analysis Risk Management and Your Organization
Appendix A: Risk Management Case Study and Practical Exercises Appendix B: Forms Used in the Risk Management Process Appendix C: Are You Safeguarding the Crown Jewels - Determining Critical and Sensitive Information Appendix D: Obtaining Asset Information - Conducting Interviews Appendix E: Technology Collection Trends in the U.S. Defense Industry Appendix F: The Foreign Threat to U.S. Business Travelers Appendix G: Intelligence Organizations Appendix H: The FBI National Security Awareness Program Appendix I: Economic & Espionage News for the Risk Manager
Risk Management: A Short History and its Importance Key Terms and Definitions Risk Management Process Overview Asset Identification Threat Identification and Assessment Conducting the Site Specific Threat Assessment Vulnerability Identification and Assessment The Risk Assessment The Risk Assessment Cost-Benefit Analysis Risk Management and Your Organization
Appendix A: Risk Management Case Study and Practical Exercises Appendix B: Forms Used in the Risk Management Process Appendix C: Are You Safeguarding the Crown Jewels - Determining Critical and Sensitive Information Appendix D: Obtaining Asset Information - Conducting Interviews Appendix E: Technology Collection Trends in the U.S. Defense Industry Appendix F: The Foreign Threat to U.S. Business Travelers Appendix G: Intelligence Organizations Appendix H: The FBI National Security Awareness Program Appendix I: Economic & Espionage News for the Risk Manager
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826