Managing Information Security Risks

Managing Information Security Risks
Author: Christopher J. Alberts
Publisher: Addison-Wesley Professional
Total Pages: 516
Release: 2003
Genre: Business & Economics
ISBN: 9780321118868

Describing OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation), a method of evaluating information security risk, this text should be of interest to risk managers.

Business Information Systems Workshops

Business Information Systems Workshops
Author: Witold Abramowicz
Publisher: Springer
Total Pages: 337
Release: 2010-09-07
Genre: Business & Economics
ISBN: 3642154026

Business information systems is a rapidly developing domain. There are many topicsthatdeserveattentionbuthavenotyetfoundaplaceincanonicalresearch. Workshops give researchers the possibility to share preliminary ideas, ?rst - perimental results, or to discuss research hypotheses. Discussions held during presentations strengthen the paper and prepare it for publication. From our - perience, workshops are a perfect instrument with which to create a community aroundvery speci?c researchtopics, thus o?ering the opportunity to promote it. Topics that do not ?nd critical feedback at the main International Conference on Business Information Systems (BIS) may experience fruitful discussion when confronted with a well-focused audience. Over the last few decades, business informationsystems have been one of the most important factors of the transition toward a knowledge-based economy. At the same time they have been subject to continuous rapid development and innovation driven both by industry and by academia. For the last 12 years these innovations were carefully observed but also shaped by researchers attending BIS yearly.

Architecting Software Intensive Systems

Architecting Software Intensive Systems
Author: Anthony J. Lattanze
Publisher: CRC Press
Total Pages: 416
Release: 2008-11-18
Genre: Computers
ISBN: 1420045709

Architectural design is a crucial first step in developing complex software intensive systems. Early design decisions establish the structures necessary for achieving broad systemic properties. However, today's organizations lack synergy between software their development processes and technological methodologies. Providing a thorough treatment of

Workshops

Workshops
Author: Jeff E. Brooks-Harris
Publisher: SAGE Publications
Total Pages: 212
Release: 1999-06-23
Genre: Social Science
ISBN: 9780761910213

Clarifying the fine art of workshop design and facilitation, this book - aimed particularly at social workers - is the ultimate guide to setting up and running a workshop. The authors' model takes account of experiential learning and individual learning styles. Numerous examples and exercises are provided.

Information Security Risk Assessment Toolkit

Information Security Risk Assessment Toolkit
Author: Mark Talabis
Publisher: Newnes
Total Pages: 282
Release: 2012-10-26
Genre: Business & Economics
ISBN: 1597497355

In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment