This product may not be available anymore.

Information Security Risk Analysis Details

  • The best price of Information Security Risk Analysis by Jumia in Egypt is 700 EGP
  • Available payment methods are
    Cash on DeliveryCredit CardE-Payment
  • Delivery fees are 15 EGP, with delivery expected within 2-5 day(s)
  • Similar products to Information Security Risk Analysis are sold at Jumia with prices starting at 810 EGP
  • The first appearance of this product was on Jun 24, 2017
  • Amongst similar products of Information Security Risk Analysis the cheapest price is 360 EGP from Jumia

Technical Specifications

SKU:JU030BK0830MCNAFAMZ
Model:9781439839560
Author:Peltier

Similar Products

Store

Payment methods

Delivery Time

Delivery Fees

Jumia's Description

  • Hardback - Number of Pages: 456 pages
  • Dimensions: 158 x 234 x 30mm - 762.03g
  • Publication date: 19 Mar 2010
  • Publisher: Taylor & Francis Ltd
  • Imprint: Auerbach Publishers Inc.
  • Publication City/Country: London, United Kingdom

INTRODUCTION Frequently Asked Questions Conclusion RISK MANAGEMENT Overview Risk Management as Part of the Business Process Employee Roles and Responsibilities Information Security Life Cycle Risk Analysis Process Risk Assessment Cost-Benefit Analysis Risk Mitigation Final Thoughts RISK ASSESSMENT PROCESS Introduction Risk Assessment Process Information Is an Asset Risk Assessment Methodology Final Thoughts QUANTITATIVE VERSUS QUALITATIVE RISK ASSESSMENT Introduction Quantitative and Qualitative Pros and Cons Qualitative Risk Assessment Basics Qualitative Risk Assessment Using Tables The 30-Minute Risk Assessment Conclusion OTHER FORMS OF QUALITATIVE RISK ASSESSMENT Introduction Hazard Impact Analysis Questionnaires Single Time Loss Algorithm Conclusion FACILITATED RISK ANALYSIS AND ASSESSMENT PROCESS (FRAAP) Introduction FRAAP Overview Why The FRAAP Was Created Introducing the FRAAP to Your Organization Conclusion VARIATIONS ON THE FRAAP Overview Infrastructure FRAAP Conclusion MAPPING CONTROLS Controls Overview Creating Your Controls List Control List Examples BUSINESS IMPACT ANALYSIS (BIA) Overview Creating a BIA Process CONCLUSION Appendix A: Sample Risk Assessment Management Summary Report Appendix B: Terms and Definitions Appendix C: Bibliography

Top Products in Booksmore

    Reviews of Information Security Risk Analysis

    • No reviews exist yet for this product.

    Video Reviews of Information Security Risk Analysis

    • loading video reviews