DEC 31, 1969

Web Seminars

Business Intelligence that is all about the customer
Available On Demand
Digital mesh or digital mess? Prepping for the future of IoT management
Available On Demand
The role of analytics in cyber security
December 13, 2016

Information Security Risk Analysis

Print
Reprints
Email

Introduces risk analysis techniques that can be used to identify and quantify both accidental and malicious threats to computer systems within an organization. The author walks through the qualitative risk analysis process using such techniques as the practical application of risk analysis (PARA) and the facilitated risk analysis process (FRAP). A case study of a truck rental company illustrates application of the method. The appendices provide a questionnaire and sample process forms.

Click here to buy this book

Please note you must now log in with your email address and password.