Auditing Information and Cyber Security Governance: A Controls-Based Approach

Auditing Information and Cyber Security Governance: A Controls-Based Approach

作者: Davis Robert E.
出版社: CRC
出版在: 2021-09-23
ISBN-13: 9780367568504
ISBN-10: 0367568500
裝訂格式: Hardcover - also called cloth, retail trade, or trade
總頁數: 284 頁





內容描述


A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom.

  • Ronald W. Hull, author, poet, and former professor and university administrator
    A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.

作者介紹


Dr. Robert E. Davis, CISA, CICA unique qualifications encompass over 30 years of internal control practice and scholarship experience. He has provided data security consulting and information systems auditing services to highly regarded government agencies and corporations of various employee sizes. His past teaching experience includes positions with Temple University, Bryant & Stratton College and Cheyney University, as well as presenting various other training sessions and courses.
Dr. Davis has authored articles addressing IT issues for ITAudit Magazine, ISACA Journal, TechTarget, and IT Governance, LTD, as well as a chapter discussing continuous auditing for Bloomsbury Information. Dr. Davis has written workbooks and other instructional material for Boson Software and Pleier Corporation.




相關書籍

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation (Paperback)

作者 James Forshaw

2021-09-23

黑客大曝光:惡意軟件和Rootkit安全(原書第2版)

作者 克裡斯托弗 C.埃里森 邁克爾·

2021-09-23

Wireshark 網絡分析實戰, 2/e

作者 [印度]甘德拉·庫馬爾·納納 堯戈什·拉姆多斯 [以色列]約拉姆·奧扎赫

2021-09-23