Optimal Spending on Cybersecurity Measures

Risk Management
 
 
Routledge (Verlag)
  • erschienen am 25. Juli 2021
  • |
  • 164 Seiten
 
E-Book | PDF ohne DRM | Systemvoraussetzungen
978-1-000-44070-6 (ISBN)
 

This book explores the strategic decisions made by organizations when implementing cybersecurity controls and leveraging economic models and theories from the economics of information security and risk-management frameworks.

Based on unique and distinct research completed within the field of risk-management and information security, this book provides insight into organizational risk management processes utilized in determining cybersecurity investments. It describes how theoretical models and frameworks rely on either specific scenarios or controlled conditions and how decisions on cybersecurity spending within organizations, specifically the funding available in comparison to the recommended security measures necessary for compliance, vary depending on stakeholders. As the trade-off between the costs of implementing a security measure and the benefit derived from the implementation of security controls is not easily measured, a business leader's decision to fund security measures may be biased. The author presents an innovative approach to assess cyber security initiatives with a risk-management perspective and leverages a data-centric focus on the evolution of cyber-attacks.

This book is ideal for business school students and technology professionals with an interest in risk management.

  • Englisch
  • Milton
  • |
  • Großbritannien
Taylor & Francis Ltd
  • Für höhere Schule und Studium
27 schwarz-weiße Abbildungen, 27 schwarz-weiße Zeichnungen, 11 schwarz-weiße Tabellen
  • 2,33 MB
978-1-000-44070-6 (9781000440706)
weitere Ausgaben werden ermittelt

Tara Kissoon is a multi-certified IT Risk & Security Leader with more than 20 years of experience in technology and 13 years of experience in the financial services industry. She brings continued success on Technology, I.T. Risk and Information Security programs and projects within large organizations. She is acknowledged as a leader, security architect and trusted advisor with a talent for working with crossfunctional teams to achieve short and long-term business objectives.

Preface; Chapter 1: Introduction; Chapter 2: Enterprise Risk Management Framework; Chapter 3: Alignment with the Enterprise Risk Management Framework; Chapter 4: Risk Management Practice - Vulnerability Management; Chapter 5: Risk Management Practice - System Development Lifecycle; Chapter 6: Risk Management Practice - Business Continuity Management; Chapter 7: Cybersecurity Risk Management Framework; Chapter 8: Case Studies; References

Dateiformat: PDF
Kopierschutz: ohne DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Ein Kopierschutz bzw. Digital Rights Management wird bei diesem E-Book nicht eingesetzt.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

18,99 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
PDF ohne DRM
siehe Systemvoraussetzungen
E-Book bestellen