Cantitate/Preț
Produs

Managing Information Risks: Threats, Vulnerabilities, and Responses

Autor William Saffady
en Limba Engleză Paperback – 28 oct 2020
Managing Information Risks: Threats, Vulnerabilities, and Responses identifies and categorizes risks related to creation, collection, storage, retention, retrieval, disclosure and ownership of information in organizations of all types and sizes. It is intended for risk managers, information governance specialists, compliance officers, attorneys, records managers, archivists, and other decision-makers, managers, and analysts who are responsible for risk management initiatives related to their organizations' information assets. An opening chapter defines and discusses risk terminology and concepts that are essential for understanding, assessing, and controlling information risk. Subsequent chapters provide detailed explanations of specific threats to an organization's information assets, an assessment of vulnerabilities that the threats can exploit, and a review of available options to address the threats and their associated vulnerabilities. Applicable laws, regulations, and standards are cited at appropriate points in the text. Each chapter includes extensive endnotes that support specific points and provide suggestions for further reading. While the book is grounded in scholarship, the treatment is practical rather than theoretical. Each chapter focuses on knowledge and recommendations that readers can use to: ·heighten risk awareness within their organizations, ·identify threats and their associated consequences, ·assess vulnerabilities, ·evaluate risk mitigation options, ·define risk-related responsibilities, and ·align information-related initiatives and activities with their organizations' risk management strategies and policies. Compared to other works, this book deals with a broader range of information risks and draws on ideas from a greater variety of disciplines, including business process management, law, financial analysis, records management, information science, and archival administration. Most books on this topic associate information risk with digital data, information technology, and cyber security. This book covers risks to information of any type in any format, including paper and photographic records as well as digital content.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 32844 lei  6-8 săpt.
  Bloomsbury Publishing – 28 oct 2020 32844 lei  6-8 săpt.
Hardback (1) 54675 lei  6-8 săpt.
  Bloomsbury Publishing – 2 noi 2020 54675 lei  6-8 săpt.

Preț: 32844 lei

Preț vechi: 40362 lei
-19%

Puncte Express: 493

Preț estimativ în valută:
5814 6753$ 5037£

Carte tipărită la comandă

Livrare economică 02-16 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781538135495
ISBN-10: 1538135493
Pagini: 288
Dimensiuni: 154 x 220 x 19 mm
Greutate: 0.38 kg
Editura: Bloomsbury Publishing
Colecția Rowman & Littlefield Publishers
Locul publicării:New York, United States

Descriere

Managing Information Risks: Threats, Vulnerabilities, and Responses identifies and categorizes risks related to creation, collection, storage, retention, retrieval, disclosure and ownership of information in organizations of all types and sizes. It is intended for risk managers, information governance specialists, compliance officers, attorneys, records managers, archivists, and other decision-makers, managers, and analysts who are responsible for risk management initiatives related to their organizations' information assets. An opening chapter defines and discusses risk terminology and concepts that are essential for understanding, assessing, and controlling information risk. Subsequent chapters provide detailed explanations of specific threats to an organization's information assets, an assessment of vulnerabilities that the threats can exploit, and a review of available options to address the threats and their associated vulnerabilities. Applicable laws, regulations, and standards are cited at appropriate points in the text. Each chapter includes extensive endnotes that support specific points and provide suggestions for further reading. While the book is grounded in scholarship, the treatment is practical rather than theoretical. Each chapter focuses on knowledge and recommendations that readers can use to: ·heighten risk awareness within their organizations, ·identify threats and their associated consequences, ·assess vulnerabilities, ·evaluate risk mitigation options, ·define risk-related responsibilities, and ·align information-related initiatives and activities with their organizations' risk management strategies and policies. Compared to other works, this book deals with a broader range of information risks and draws on ideas from a greater variety of disciplines, including business process management, law, financial analysis, records management, information science, and archival administration. Most books on this topic associate information risk with digital data, information technology, and cyber security. This book covers risks to information of any type in any format, including paper and photographic records as well as digital content.


Cuprins

Preface
Chapter 1: Risk Terms and Concepts
Chapter 2: Creation and Collection of Information
Chapter 3: Loss of Information
Chapter 4: Retention of Information
Chapter 5: Retrieval and Disclosure of Information
Chapter 6: Ownership of Information

Recenzii

This is the most important, comprehensive, and sensible book available today on information risk management.

Risk managers, information governance specialists, records mangers, compliance officers, and other professionals will appreciate the lifecycle approach taken to address information-related threats and vulnerabilities that arise at any point from information creation through disposition.

The value of the work as a textbook for courses in risk management, information governance and related subjects is undeniable. Those new to both information governance and risk management will appreciate Saffady's view of risk as a combination of threats, vulnerabilities, and consequences and his assertion that without vulnerability a threat can pose no harm.

All readers will come away with an understanding of information-related threats, vulnerabilities each threat can exploit, and options available to address those threats and associated vulnerabilities.