NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Optimal spending on cybersecurity measures : risk management / Tara Kissoon.

By: Material type: TextTextSeries: Publisher: Abingdon, Oxon ; New York, NY : Routledge, 2022Copyright date: ©2022Description: 1 online resource (vii, 156 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781003200895
  • 1003200893
  • 9781000440768
  • 1000440761
  • 9781000440706
  • 1000440702
Subject(s): DDC classification:
  • 658.4/78 23
LOC classification:
  • HF5548.37 .K57 2022
Online resources:
Contents:
Introduction -- Enterprise Risk Management Framework -- Alignment with the Enterprise Risk Management Framework -- Risk Management Practice -- Vulnerability Management -- Risk Management Practice -- System Development Lifecycle -- Risk Management Practice -- Business Continuity Management -- Cybersecurity Risk Management Framework -- Case Studies.
Summary: "This book explores the strategic decisions made by organizations when implementing cybersecurity controls, leveraging economic models and theories from the economics of information security and risk management frameworks. Based on unique and distinct research completed within the field of risk management and information security, this book provides insight into organizational risk management processes utilized in determining cybersecurity investments. It looks at how theoretical models and frameworks rely on either specific scenarios or controlled conditions, and how decisions on cybersecurity spending within organizations, specifically the funding available in comparison to the recommended security measures necessary for compliance, vary depending on stakeholders. As the trade-off between the costs of implementing a security measure and the benefit derived from the implementation of the security control is not easily measured, a business leader's decision to fund security measures may be biased. The author presents an innovative approach to assess cyber security initiatives with a risk management perspective and leverages a data-centric focus on the evolution of cyber-attacks. This book is ideal for business school students and technology professionals with an interest in risk management"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Introduction -- Enterprise Risk Management Framework -- Alignment with the Enterprise Risk Management Framework -- Risk Management Practice -- Vulnerability Management -- Risk Management Practice -- System Development Lifecycle -- Risk Management Practice -- Business Continuity Management -- Cybersecurity Risk Management Framework -- Case Studies.

"This book explores the strategic decisions made by organizations when implementing cybersecurity controls, leveraging economic models and theories from the economics of information security and risk management frameworks. Based on unique and distinct research completed within the field of risk management and information security, this book provides insight into organizational risk management processes utilized in determining cybersecurity investments. It looks at how theoretical models and frameworks rely on either specific scenarios or controlled conditions, and how decisions on cybersecurity spending within organizations, specifically the funding available in comparison to the recommended security measures necessary for compliance, vary depending on stakeholders. As the trade-off between the costs of implementing a security measure and the benefit derived from the implementation of the security control is not easily measured, a business leader's decision to fund security measures may be biased. The author presents an innovative approach to assess cyber security initiatives with a risk management perspective and leverages a data-centric focus on the evolution of cyber-attacks. This book is ideal for business school students and technology professionals with an interest in risk management"-- Provided by publisher.

OCLC-licensed vendor bibliographic record.

There are no comments on this title.

to post a comment.
© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha