Information Security Risk Analysis
<P>Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. <STRONG>Information Security Risk Analysis, Third Edition</STRONG> demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to your organization.<BR><BR>Providing access to more than 350 pages of helpful ancillary materials, this volume:</P> <UL> <LI>Presents and explains the key components of risk management</LI> <LI>Demonstrates how the components of risk management are absolutely necessary and work in your organization and business situation</LI> <LI>Shows how a cost-benefit analysis is part of risk management and how this analysis is performed as part of risk mitigation</LI> <LI>Explains how to draw up an action plan to protect the assets of your organization when the risk assessment process concludes</LI> <LI>Examines the difference between a Gap Analysis and a Security or Controls Assessment</LI> <LI>Presents case studies and examples of all risk management components</LI> <P></P></UL> <P></P> <P>Authored by renowned security expert and certification instructor, Thomas Peltier, this authoritative reference provides you with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment in a matter of days. Supplemented with online access to user-friendly checklists, forms, questionnaires, sample assessments, and other documents, this work is truly a one-stop, how-to resource for industry and academia professionals.</P>