Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information assurance and risk manag...
~
Fowler, Bradley.
Linked to FindBook
Google Book
Amazon
博客來
Information assurance and risk management strategies = manage your information systems and tools in the cloud /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information assurance and risk management strategies/ by Bradley Fowler.
Reminder of title:
manage your information systems and tools in the cloud /
Author:
Fowler, Bradley.
Published:
Berkeley, CA :Apress : : 2023.,
Description:
xiii, 150 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1: Information Assurance Analysis -- Chapter 2: Technology Risk Analysis & Management Strategies -- Chapter 3: Privacy Compliance Strategies -- Chapter 4: Intrusion Detection and AWS Cloud Services -- Chapter 5: Corporation Enterprise Architecture ISTC Strategies -- Chapter 6: IT Strategy Policy.Glossary.References.
Contained By:
Springer Nature eBook
Subject:
Cloud computing - Security measures. -
Online resource:
https://doi.org/10.1007/978-1-4842-9742-1
ISBN:
9781484297421
Information assurance and risk management strategies = manage your information systems and tools in the cloud /
Fowler, Bradley.
Information assurance and risk management strategies
manage your information systems and tools in the cloud /[electronic resource] :by Bradley Fowler. - Berkeley, CA :Apress :2023. - xiii, 150 p. :ill., digital ;24 cm.
Chapter 1: Information Assurance Analysis -- Chapter 2: Technology Risk Analysis & Management Strategies -- Chapter 3: Privacy Compliance Strategies -- Chapter 4: Intrusion Detection and AWS Cloud Services -- Chapter 5: Corporation Enterprise Architecture ISTC Strategies -- Chapter 6: IT Strategy Policy.Glossary.References.
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you'll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. Take the first step to safeguarding your company's highly valuable information assets today! You will: Understand what information assurance is and how it relates to risk management strategies Assess, develop, implement, and manage risk management strategies for corporate information systems, technology, and cloud environments Develop and utilize information usage profiles and risk factor tables Understand the value of data encryption and usage of private and public key exchange for information assurance and security.
ISBN: 9781484297421
Standard No.: 10.1007/978-1-4842-9742-1doiSubjects--Topical Terms:
1375313
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .F68 2023
Dewey Class. No.: 004.6782
Information assurance and risk management strategies = manage your information systems and tools in the cloud /
LDR
:03299nmm a2200349 a 4500
001
2334963
003
DE-He213
005
20230922193535.0
006
m d
007
cr nn 008maaau
008
240402s2023 cau s 0 eng d
020
$a
9781484297421
$q
(electronic bk.)
020
$a
9781484297414
$q
(paper)
024
7
$a
10.1007/978-1-4842-9742-1
$2
doi
035
$a
978-1-4842-9742-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.585
$b
.F68 2023
072
7
$a
UR
$2
bicssc
072
7
$a
GPQD
$2
bicssc
072
7
$a
BUS033070
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
GPQD
$2
thema
082
0 4
$a
004.6782
$2
23
090
$a
QA76.585
$b
.F785 2023
100
1
$a
Fowler, Bradley.
$3
3629778
245
1 0
$a
Information assurance and risk management strategies
$h
[electronic resource] :
$b
manage your information systems and tools in the cloud /
$c
by Bradley Fowler.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xiii, 150 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Information Assurance Analysis -- Chapter 2: Technology Risk Analysis & Management Strategies -- Chapter 3: Privacy Compliance Strategies -- Chapter 4: Intrusion Detection and AWS Cloud Services -- Chapter 5: Corporation Enterprise Architecture ISTC Strategies -- Chapter 6: IT Strategy Policy.Glossary.References.
520
$a
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you'll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. Take the first step to safeguarding your company's highly valuable information assets today! You will: Understand what information assurance is and how it relates to risk management strategies Assess, develop, implement, and manage risk management strategies for corporate information systems, technology, and cloud environments Develop and utilize information usage profiles and risk factor tables Understand the value of data encryption and usage of private and public key exchange for information assurance and security.
650
0
$a
Cloud computing
$x
Security measures.
$3
1375313
650
0
$a
Risk management.
$3
540477
650
1 4
$a
IT Risk Management.
$3
3538812
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Business Information Systems.
$3
892640
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9742-1
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9461168
電子資源
11.線上閱覽_V
電子書
EB QA76.585 .F68 2023
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login