語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information assurance and risk management strategies = manage your information systems and tools in the cloud /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information assurance and risk management strategies/ by Bradley Fowler.
其他題名:
manage your information systems and tools in the cloud /
作者:
Fowler, Bradley.
出版者:
Berkeley, CA :Apress : : 2023.,
面頁冊數:
xiii, 150 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Business Information Systems. -
電子資源:
https://doi.org/10.1007/978-1-4842-9742-1
ISBN:
9781484297421
Information assurance and risk management strategies = manage your information systems and tools in the cloud /
Fowler, Bradley.
Information assurance and risk management strategies
manage your information systems and tools in the cloud /[electronic resource] :by Bradley Fowler. - Berkeley, CA :Apress :2023. - xiii, 150 p. :ill., digital ;24 cm.
Chapter 1: Information Assurance Analysis -- Chapter 2: Technology Risk Analysis & Management Strategies -- Chapter 3: Privacy Compliance Strategies -- Chapter 4: Intrusion Detection and AWS Cloud Services -- Chapter 5: Corporation Enterprise Architecture ISTC Strategies -- Chapter 6: IT Strategy Policy.Glossary.References.
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you'll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. Take the first step to safeguarding your company's highly valuable information assets today! You will: Understand what information assurance is and how it relates to risk management strategies Assess, develop, implement, and manage risk management strategies for corporate information systems, technology, and cloud environments Develop and utilize information usage profiles and risk factor tables Understand the value of data encryption and usage of private and public key exchange for information assurance and security.
ISBN: 9781484297421
Standard No.: 10.1007/978-1-4842-9742-1doiSubjects--Topical Terms:
669204
Business Information Systems.
LC Class. No.: QA76.585 / .F68 2023
Dewey Class. No.: 004.6782
Information assurance and risk management strategies = manage your information systems and tools in the cloud /
LDR
:03299nam a2200349 a 4500
001
1117190
003
DE-He213
005
20230922193535.0
006
m d
007
cr nn 008maaau
008
240124s2023 cau s 0 eng d
020
$a
9781484297421
$q
(electronic bk.)
020
$a
9781484297414
$q
(paper)
024
7
$a
10.1007/978-1-4842-9742-1
$2
doi
035
$a
978-1-4842-9742-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.585
$b
.F68 2023
072
7
$a
UR
$2
bicssc
072
7
$a
GPQD
$2
bicssc
072
7
$a
BUS033070
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
GPQD
$2
thema
082
0 4
$a
004.6782
$2
23
090
$a
QA76.585
$b
.F785 2023
100
1
$a
Fowler, Bradley.
$3
1430840
245
1 0
$a
Information assurance and risk management strategies
$h
[electronic resource] :
$b
manage your information systems and tools in the cloud /
$c
by Bradley Fowler.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xiii, 150 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Information Assurance Analysis -- Chapter 2: Technology Risk Analysis & Management Strategies -- Chapter 3: Privacy Compliance Strategies -- Chapter 4: Intrusion Detection and AWS Cloud Services -- Chapter 5: Corporation Enterprise Architecture ISTC Strategies -- Chapter 6: IT Strategy Policy.Glossary.References.
520
$a
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you'll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. Take the first step to safeguarding your company's highly valuable information assets today! You will: Understand what information assurance is and how it relates to risk management strategies Assess, develop, implement, and manage risk management strategies for corporate information systems, technology, and cloud environments Develop and utilize information usage profiles and risk factor tables Understand the value of data encryption and usage of private and public key exchange for information assurance and security.
650
2 4
$a
Business Information Systems.
$3
669204
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Computer and Information Systems Applications.
$3
1365732
650
1 4
$a
IT Risk Management.
$3
1366666
650
0
$a
Risk management.
$3
559158
650
0
$a
Cloud computing
$x
Security measures.
$3
775821
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9742-1
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入