Book description
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Managing Risk in Information Systems provides a unique, in-depth look at how to manage and reduce IT associated risks. Written by an industry expert, this book provides a comprehensive explanation of the SSCP® Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Using examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk.Table of contents
- Copyright
- Preface
- Acknowledgments
- About the Author
-
ONE. Risk Management Business Challenges
- 1. Risk Management Fundamentals
- 2. Managing Risk: Threats, Vulnerabilities, and Exploits
-
3. Maintaining Compliance
- Compliance
- Regulations Related to Compliance
- Organizational Policies for Compliance
-
Standards and Guidelines for Compliance
- Payment Card Industry Data Security Standard
- National Institute of Standards and Technology
- Generally Accepted Information Security Principles
- Control Objectives for Information and Related Technology
- International Organization for Standardization
- International Electrotechnical Commission
- Information Technology Infrastructure Library
- Capability Maturity Model Integration
- Department of Defense Information Assurance Certification and Accreditation Process
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 3 ASSESSMENT
-
4. Developing a Risk Management Plan
- Objectives of a Risk Management Plan
- Scope of a Risk Management Plan
- Assigning Responsibilities
- Describing Procedures and Schedules for Accomplishment
- Reporting Requirements
- Plan of Action and Milestones
- Charting the Progress of a Risk Management Plan
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 4 ASSESSMENT
-
TWO. Mitigating Risk
- 5. Defining Risk Assessment Approaches
-
6. Performing a Risk Assessment
- Selecting a Risk Assessment Methodology
- Identifying the Management Structure
- Identifying Assets and Activities Within Risk Assessment Boundaries
- Identifying and Evaluating Relevant Threats
- Identifying and Evaluating Relevant Vulnerabilities
- Identifying and Evaluating Countermeasures
- Selecting a Methodology Based on Assessment Needs
- Develop Mitigating Recommendations
- Present Risk Assessment Results
- Best Practices for Performing Risk Assessments
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 6 ASSESSMENT
-
7. Identifying Assets and Activities to Be Protected
- System Access and Availability
- System Functions: Manual and Automated
- Hardware Assets
- Software Assets
- Personnel Assets
- Data and Information Assets
- Asset and Inventory Management Within the Seven Domains of a Typical IT Infrastructure
- Identifying Facilities and Supplies Needed to Maintain Business Operations
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 7 ASSESSMENT
-
8. Identifying and Analyzing Threats, Vulnerabilities, and Exploits
- Threat Assessments
-
Vulnerability Assessments
- Documentation Review
- Review of System Logs, Audit Trails, and Intrusion Detection System Outputs
- Vulnerability Scans and Other Assessment Tools
- Audits and Personnel Interviews
- Process Analysis and Output Analysis
- System Testing
- Best Practices for Performing Vulnerability Assessments Within the Seven Domains of a Typical IT Infrastructure
- Exploit Assessments
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 8 ASSESSMENT
- 9. Identifying and Analyzing Risk Mitigation Security Controls
-
10. Planning Risk Mitigation Throughout Your Organization
- Where Should Your Organization Start with Risk Mitigation?
- What Is the Scope of Risk Management for Your Organization?
- Understanding and Assessing the Impact of Legal and Compliance Issues on Your Organization
- Translating Legal and Compliance Implications for Your Organization
- Assessing the Impact of Legal and Compliance Implications on the Seven Domains of a Typical IT Infrastructure
- Assessing How Security Countermeasures and Safeguards Can Assist with Risk Mitigation
- Understanding the Operational Implications of Legal and Compliance Requirements
- Identifying Risk Mitigation and Risk Reduction Elements for the Entire Organization
- Performing a Cost-Benefit Analysis
- Best Practices for Planning Risk Mitigation Throughout Your Organization
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 10 ASSESSMENT
-
11. Turning Your Risk Assessment into a Risk Mitigation Plan
- Review the Risk Assessment for Your IT Infrastructure
- Translating Your Risk Assessment into a Risk Mitigation Plan
- Prioritizing Risk Elements That Require Risk Mitigation
- Verifying Risk Elements and How These Risks Can Be Mitigated
- Performing a Cost-Benefit Analysis on the Identified Risk Elements
- Implementing a Risk Mitigation Plan
- Following Up on the Risk Mitigation Plan
- Best Practices for Enabling a Risk Mitigation Plan from Your Risk Assessment
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 11 ASSESSMENT
-
THREE. Risk Mitigation Plans
-
12. Mitigating Risk with a Business Impact Analysis
- What Is a Business Impact Analysis?
- Defining the Scope of Your Business Impact Analysis
- Objectives of a Business Impact Analysis
- The Steps of a Business Impact Analysis Process
- Identifying Mission-Critical Business Functions and Processes
- Mapping Business Functions and Processes to IT Systems
- Best Practices for Performing a BIA for Your Organization
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 12 ASSESSMENT
- ENDNOTE
-
13. Mitigating Risk with a Business Continuity Plan
- What Is a Business Continuity Plan (BCP)?
- Elements of a BCP
- How Does a BCP Mitigate an Organization's Risk?
- Best Practices for Implementing a BCP for Your Organization
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 13 ASSESSMENT
-
14. Mitigating Risk with a Disaster Recovery Plan
- What Is a Disaster Recovery Plan (DRP)?
- Critical Success Factors
- Elements of a DRP
- How Does a DRP Mitigate an Organization's Risk?
- Best Practices for Implementing a DRP for Your Organization
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 14 ASSESSMENT
-
15. Mitigating Risk with a Computer Incident Response Team Plan
- What Is a Computer Incident Response Team (CIRT) Plan?
- Purpose of a CIRT Plan
- Elements of a CIRT Plan
- How Does a CIRT Plan Mitigate an Organization's Risk?
- Best Practices for Implementing a CIRT Plan for Your Organization
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 15 ASSESSMENT
-
12. Mitigating Risk with a Business Impact Analysis
- A. Answer Key
- B. Standard Acronyms
- Glossary of Key Terms
-
References
Product information
- Title: Managing Risk in Information Systems
- Author(s):
- Release date: October 2010
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9780763791889
You might also like
book
Managing Risk in Information Systems, 2nd Edition
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Revised and updated …
book
Managing Risk in Information Systems, 3rd Edition
Revised and updated with the latest data in the field, the Second Edition of Managing Risk …
book
The Cyber Risk Handbook
Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide …
book
The Compliance Revolution: How Compliance Needs to Change to Survive
The Compliance Revolution—Practical, Powerful Changes for Strategic Organizational Value Compliance is absolutely critical in creating a …