Auditing Information and Cyber Security Governance Auditing Information and Cyber Security Governance
Security, Audit and Leadership Series

Auditing Information and Cyber Security Governance

A Controls-Based Approach

    • ¥9,400
    • ¥9,400

発行者による作品情報

"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom."

– Ronald W. Hull, author, poet, and former professor and university administrator

A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.

ジャンル
ビジネス/マネー
発売日
2021年
9月22日
言語
EN
英語
ページ数
298
ページ
発行者
CRC Press
販売元
Taylor & Francis Group
サイズ
8.4
MB
IT Governance and Information Security IT Governance and Information Security
2021年
Information Security Governance Information Security Governance
2018年
Strong Security Governance through Integration and Automation Strong Security Governance through Integration and Automation
2021年
Optimal Spending on Cybersecurity Measures Optimal Spending on Cybersecurity Measures
2021年
Responsive Security Responsive Security
2017年
Strategic Cyber Security Management Strategic Cyber Security Management
2022年
Information Systems Auditing: The IS Audit Planning Process Information Systems Auditing: The IS Audit Planning Process
2011年
Assuring Information Security Assuring Information Security
2012年
IT Auditing: Assuring Information Assets Protection IT Auditing: Assuring Information Assets Protection
2012年
Information Systems Auditing: The IS Audit Follow-up Process Information Systems Auditing: The IS Audit Follow-up Process
2011年
IT Auditing: An Adaptive Process IT Auditing: An Adaptive Process
2011年
Assuring IT Governance Assuring IT Governance
2011年
Teach, Train, Transform Teach, Train, Transform
2026年
Audit Alchemy Audit Alchemy
2026年
Modern Benford’s Law Modern Benford’s Law
2026年
It’s Not in the Manual It’s Not in the Manual
2025年
Digitalization and Women's Rights Digitalization and Women's Rights
2025年
Governance, Risk and Compliance Governance, Risk and Compliance
2025年