Managing Information Security Risks: The OCTAVESM Approach
Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluati...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Information security requires far more than the latest tool or
technology. Organizations must understand exactly what they are
trying to protect--and why--before selecting specific solutions.
Security issues are complex and often are rooted in organizational
and business concerns. A careful evaluation of security needs and
risks in this broader context must precede any security
implementation to insure that all the relevant, underlying problems
are first uncovered.The OCTAVE approach for self-directed security evaluations was
developed at the influential CERT(R) Coordination Center. This
approach is designed to help you:Identify and rank key information assetsWeigh threats to those assetsAnalyze vulnerabilities involving both technology and
practicesOCTAVE(SM) enables any organization to develop security
priorities based on the organization's particular business
concerns. The approach provides a coherent framework for aligning
security actions with overall objectives.Managing Information Security Risks, written by the
developers of OCTAVE, is the complete and authoritative guide to
its principles and implementations. The book:Provides a systematic way to evaluate and manage information
security risksIllustrates the implementation of self-directed
evaluationsShows how to tailor evaluation methods to different types of
organizationsSpecial features of the book include:A running example to illustrate important concepts and
techniquesA convenient set of evaluation worksheetsA catalog of best practices to which organizations can compare
their own
0321118863B05172002 |
---|