000 03700cam a2200553 i 4500
001 9781003200895
003 FlBoTFG
005 20240213122826.0
006 m o d
007 cr |||||||||||
008 210423t20222022enka ob 001 0 eng
040 _aOCoLC-P
_beng
_erda
_cOCoLC-P
020 _a9781003200895
_qelectronic book
020 _a1003200893
_qelectronic book
020 _a9781000440768
_qelectronic book
020 _a1000440761
_qelectronic book
020 _a9781000440706
_qelectronic book
020 _a1000440702
_qelectronic book
020 _z9781032061405
_qhardcover
035 _a(OCoLC)1248601757
035 _a(OCoLC-P)1248601757
050 0 4 _aHF5548.37
_b.K57 2022
072 7 _aBUS
_x083000
_2bisacsh
072 7 _aBUS
_x033070
_2bisacsh
072 7 _aBUS
_x041000
_2bisacsh
072 7 _aKJC
_2bicssc
082 0 0 _a658.4/78
_223
100 1 _aKissoon, Tara,
_eauthor.
245 1 0 _aOptimal spending on cybersecurity measures :
_brisk management /
_cTara Kissoon.
264 1 _aAbingdon, Oxon ;
_aNew York, NY :
_bRoutledge,
_c2022.
264 4 _c©2022
300 _a1 online resource (vii, 156 pages) :
_billustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aRoutledge focus on business and management
505 0 _aIntroduction -- Enterprise Risk Management Framework -- Alignment with the Enterprise Risk Management Framework -- Risk Management Practice -- Vulnerability Management -- Risk Management Practice -- System Development Lifecycle -- Risk Management Practice -- Business Continuity Management -- Cybersecurity Risk Management Framework -- Case Studies.
520 _a"This book explores the strategic decisions made by organizations when implementing cybersecurity controls, leveraging economic models and theories from the economics of information security and risk management frameworks. Based on unique and distinct research completed within the field of risk management and information security, this book provides insight into organizational risk management processes utilized in determining cybersecurity investments. It looks at how theoretical models and frameworks rely on either specific scenarios or controlled conditions, and how decisions on cybersecurity spending within organizations, specifically the funding available in comparison to the recommended security measures necessary for compliance, vary depending on stakeholders. As the trade-off between the costs of implementing a security measure and the benefit derived from the implementation of the security control is not easily measured, a business leader's decision to fund security measures may be biased. The author presents an innovative approach to assess cyber security initiatives with a risk management perspective and leverages a data-centric focus on the evolution of cyber-attacks. This book is ideal for business school students and technology professionals with an interest in risk management"--
_cProvided by publisher.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aData protection.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aRisk management.
650 7 _aBUSINESS & ECONOMICS / Information Management
_2bisacsh
650 7 _aBUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
_2bisacsh
650 7 _aBUSINESS & ECONOMICS / Management
_2bisacsh
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003200895
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c5030
_d5030