Hidden fields
Libros Libros
" ... against the losses that would be expected if these measures were not in place. Part of the security management process on the matrix. 63 Fed. Reg. 43,242, 43,275 (Aug. 12, 1998) Risk Management: Risk is the possibility of something adverse happening.... "
An Introduction to Computer Security: The NIST Handbook - Página 59
por Barbara Guttman, Edward A. Roback - 1996 - 276 páginas
Vista completa - Acerca de este libro

Computer Security Report Card: Hearing Before the Subcommittee on Government ...

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2001 - 240 páginas
...activities working closely with bureau and system-level activities. (800-143.2) 3. Risk Management Risk management is the process of assessing risk,...acceptable level and maintaining that level of risk. (800-14 3.3) 4. Lifecyde Planning Security, like other aspects of an IT system, is best managed if...
Vista completa - Acerca de este libro

Information Security Management Handbook, Volume 4, Volumen4

Harold F. Tipton - 2002 - 1018 páginas
...program. What is risk management? The General Accounting Office (GAO) has a good, high-level definition: risk management is the process of assessing risk,...acceptable level, and maintaining that level of risk. There are four basic principles of effective risk management. Assess Risk and Determine Needs. Your...
Vista previa limitada - Acerca de este libro

Securing Converged IP Networks

Tyson Macaulay - 2006 - 280 páginas
...Assessment Paradigm MANAGEMENT CONTROLS OPERATIONAL CONTROLS Technical Threats CONCLUSION INTRODUCTION "Risk management is the process of assessing risk,...an acceptable level, and maintaining that level of risk."1 This chapter extends our risk management exercise into the area of reducing converged ICT risks...
Vista previa limitada - Acerca de este libro




  1. Mi biblioteca
  2. Ayuda
  3. Búsqueda avanzada de libros