O'Reilly logo

Managing Risk in Information Systems by Darril Gibson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Part TWO. Mitigating Risk

  • CHAPTER 5 Defining Risk Assessment Approaches 112

  • CHAPTER 6 Performing a Risk Assessment 138

  • CHAPTER 7 Identifying Assets and Activities to Be Protected 166

  • CHAPTER 8 Identifying and Analyzing Threats, Vulnerabilities, and Exploits 194

  • CHAPTER 9 Identifying and Analyzing Risk Mitigation Security Controls 222

  • CHAPTER 10 Planning Risk Mitigation Throughout the Organization 250

  • CHAPTER 11 Turning Your Risk Assessment into a Risk Mitigation Plan 278

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required