Buch, Englisch, 298 Seiten, Format (B × H): 189 mm x 261 mm, Gewicht: 702 g
A Controls-Based Approach
Buch, Englisch, 298 Seiten, Format (B × H): 189 mm x 261 mm, Gewicht: 702 g
Reihe: Security, Audit and Leadership Series
ISBN: 978-0-367-56850-4
Verlag: CRC Press
– Ronald W. Hull, author, poet, and former professor and university administrator
A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
Zielgruppe
Academic, Professional, and Professional Practice & Development
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Wirtschaftswissenschaften Betriebswirtschaft Management
- Wirtschaftswissenschaften Betriebswirtschaft Unternehmensfinanzen Controlling, Wirtschaftsprüfung, Revision
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
Weitere Infos & Material
1. Security Governance
2. Security Governance Environment
3. Security Governance Management
4. Security Governance Processes
5. Organizational Employees
6. External Organizational Actors
7.Information Security Governance Audit
8. Cyber Security Governance Audit