Auditing Information and Cyber Security Governance Auditing Information and Cyber Security Governance
Security, Audit and Leadership Series

Auditing Information and Cyber Security Governance

A Controls-Based Approach

    • €52.99
    • €52.99

Publisher Description

"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom."

– Ronald W. Hull, author, poet, and former professor and university administrator

A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.

GENRE
Business & Personal Finance
RELEASED
2021
22 September
LANGUAGE
EN
English
LENGTH
298
Pages
PUBLISHER
CRC Press
SIZE
8.4
MB
IT Governance and Information Security IT Governance and Information Security
2021
Information Security Governance Information Security Governance
2018
Strong Security Governance through Integration and Automation Strong Security Governance through Integration and Automation
2021
Information Security Governance Information Security Governance
2008
Optimal Spending on Cybersecurity Measures Optimal Spending on Cybersecurity Measures
2021
Responsive Security Responsive Security
2017
Assuring IT Governance Assuring IT Governance
2011
Assuring Information Security Assuring Information Security
2012
IT Auditing: Assuring Information Assets Protection IT Auditing: Assuring Information Assets Protection
2012
Information Systems Auditing: The IS Audit Follow-up Process Information Systems Auditing: The IS Audit Follow-up Process
2011
IT Auditing: An Adaptive Process IT Auditing: An Adaptive Process
2011
Information Systems Auditing: The IS Audit Testing Process Information Systems Auditing: The IS Audit Testing Process
2011
Digitalization and Women's Rights Digitalization and Women's Rights
2025
Program Architecture Program Architecture
2025
Guardians of the Digital Age Guardians of the Digital Age
2025
Integrated Assurance Integrated Assurance
2025
Preparing for Sustainability Audits Preparing for Sustainability Audits
2025
Scaling Pyramids Scaling Pyramids
2025