This web based self-study course aligns the risk management process with the business goals of the enterprise and explains various approaches to managing threats, hazards and concerns. The course enables information security managers and professionals to understand when, why and how to conduct effective risk assessment and analysis. This knowledge helps to protect the critical assets of the enterprise. The course takes you through the risk analysis process of identifying asset ad threats, prioritizing threat vulnerabilities, identifying appropriate safeguards and monitoring their effectiveness within your organization. You will learn pros and cons of various quantitative and qualitative methods of analysis, including the facilitated risk analysis process (FRAAP). The course contains time-saving checklists, examples, case-studies, and definitions of terms and standard controls for regulations such as GLBA, HIPPA, SOX, ISO 17799, among others.
"synopsis" may belong to another edition of this title.
"Introduces risk analysis techniques that can be used to identify and quantify both accidental and malicious threats to computer systems within an organization." -Sci Tech Book News, Vol. 25, No. 3, September 2001 "This book has radically influenced my approach to security risk managementFrom the beginning this book grabs your attentionif you purchase this book for the tables and checklists alone you would be getting a bargainIf you perform security risk analysis, or business continuity or disaster recovery planning this book is 'must reading'earns a solid 5 stars and Mr. Peltier earns my gratitude for showing me a better way." --Mike Tarrani, on Amazon.com
"About this title" may belong to another edition of this title.