Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework / Edition 1

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework / Edition 1

ISBN-10:
149878514X
ISBN-13:
9781498785143
Pub. Date:
03/08/2017
Publisher:
Taylor & Francis
ISBN-10:
149878514X
ISBN-13:
9781498785143
Pub. Date:
03/08/2017
Publisher:
Taylor & Francis
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework / Edition 1

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework / Edition 1

$150.0 Current price is , Original price is $150.0. You
$150.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.


Product Details

ISBN-13: 9781498785143
Publisher: Taylor & Francis
Publication date: 03/08/2017
Series: Security, Audit and Leadership Series
Pages: 338
Product dimensions: 6.12(w) x 9.19(h) x (d)

About the Author

Anne Kohnke, Ken Sigler, Dan Shoemaker

Table of Contents

Introduction to Organizational Security Risk Management. Survey of Existing Risk Management Models. Step 1 – Categorize Information and Information Systems. Step 2 – Select Security Controls. Step 3 – Implement Security Controls. Step 4 – Assess Security Controls. Step 5 – Authorize Information Systems. Step 6 – Monitor Security State. Practical Application to the Implementation of the NIST Risk Management Framework.

From the B&N Reads Blog

Customer Reviews