Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Fowler, Bradley, 1968- author.

Title Information assurance and risk management strategies : manage your information systems and tools in the cloud / Bradley Fowler. [O'Reilly electronic resource]

Publication Info. Berkeley, CA : Apress, 2023.
QR Code
Description 1 online resource (xiii, 150 pages) : illustrations
Contents Chapter 1: Information Assurance Analysis -- Chapter 2: Technology Risk Analysis & Management Strategies -- Chapter 3: Privacy Compliance Strategies -- Chapter 4: Intrusion Detection and AWS Cloud Services -- Chapter 5: Corporation Enterprise Architecture ISTC Strategies -- Chapter 6: IT Strategy Policy.Glossary.References.
Summary Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you'll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. Take the first step to safeguarding your company's highly valuable information assets today! You will: Understand what information assurance is and how it relates to risk management strategies Assess, develop, implement, and manage risk management strategies for corporate information systems, technology, and cloud environments Develop and utilize information usage profiles and risk factor tables Understand the value of data encryption and usage of private and public key exchange for information assurance and security.
Bibliography Includes bibliographical references and index.
Subject Cloud computing -- Security measures.
Risk management.
Infonuagique -- Sécurité -- Mesures.
Gestion du risque.
risk management.
Cloud computing -- Security measures
Risk management
Other Form: Print version: 1484297415 9781484297414 (OCoLC)1391093686
ISBN 9781484297421 (electronic bk.)
1484297423 (electronic bk.)
Standard No. 10.1007/978-1-4842-9742-1 doi
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information