Managing Information Security Risks: The OCTAVE Approach
Christopher Alberts, Audrey Dorofee
- 出版商: Addison Wesley
- 出版日期: 2002-07-09
- 售價: $3,350
- 貴賓價: 9.5 折 $3,183
- 語言: 英文
- 頁數: 520
- 裝訂: Hardcover
- ISBN: 0321118863
- ISBN-13: 9780321118868
-
相關分類:
資訊安全
已絕版
買這商品的人也買了...
-
$480$408 -
$680$578 -
$650$553 -
$980$774 -
$970Introduction to Algorithms, 2/e
-
$700Microsoft Visual Basic .NET Step by Step
-
$920$727 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$620$558 -
$780$741 -
$650$553 -
$760$600 -
$590$466 -
$600$540 -
$690$538 -
$420$332 -
$720$569 -
$880$792 -
$1,045Linux Kernel Development
-
$750$675 -
$560$504 -
$650$514 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$880$695 -
$180$142
相關主題
商品描述
Table of Contents
List of Figures.
List of Tables.
Preface.
Acknowledgments.
I. INTRODUCTION.
1. Managing Information Security Risks.
2. Principles and Attributes of
Information Security Risk Evaluations.
II. THE OCTAVE METHOD.
3. Introduction to the OCTAVE Method.
4.
Preparing for OCTAVE.
5. Identifying Organizational Knowledge(Processes 1 to
3).
6. Creating Threat Profiles (Process 4).
7. Identifying Key
Components (Process 5).
8. Evaluating Selected Components (Process 6).
9. Conducting the Risk Analysis (Process 7).
10. Developing a Protection
Strategy—Workshop A (Process 8A).
11. Developing a Protection
Strategy--Workshop B (Process 8B).
III. VARIATIONS ON THE OCTAVE APPROACH.
12. An Introduction to Tailoring OCTAVE.
13. Practical Applications.
14. Information Security Risk Management.
Glossary.
Bibliography.
Appendix A. Case Scenario for the OCTAVE Method.
Appendix B. Worksheets.
Appendix C. Catalog of Practices.
About the Authors.