Description

Book Synopsis
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within your organization.Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you'll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization.As you progress through the book, you'll

Table of Contents

Information Assurance and Risk Management

Product form

£39.99

Includes FREE delivery

RRP £49.99 – you save £10.00 (20%)

Order before 4pm tomorrow for delivery by Fri 19 Dec 2025.

A Paperback / softback by Bradley Fowler

1 in stock


    View other formats and editions of Information Assurance and Risk Management by Bradley Fowler

    Publisher: APress
    Publication Date: 23/09/2023
    ISBN13: 9781484297414, 978-1484297414
    ISBN10: 1484297415

    Description

    Book Synopsis
    Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within your organization.Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you'll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization.As you progress through the book, you'll

    Table of Contents

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account