000 | 03700cam a2200553 i 4500 | ||
---|---|---|---|
001 | 9781003200895 | ||
003 | FlBoTFG | ||
005 | 20240213122826.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 210423t20222022enka ob 001 0 eng | ||
040 |
_aOCoLC-P _beng _erda _cOCoLC-P |
||
020 |
_a9781003200895 _qelectronic book |
||
020 |
_a1003200893 _qelectronic book |
||
020 |
_a9781000440768 _qelectronic book |
||
020 |
_a1000440761 _qelectronic book |
||
020 |
_a9781000440706 _qelectronic book |
||
020 |
_a1000440702 _qelectronic book |
||
020 |
_z9781032061405 _qhardcover |
||
035 | _a(OCoLC)1248601757 | ||
035 | _a(OCoLC-P)1248601757 | ||
050 | 0 | 4 |
_aHF5548.37 _b.K57 2022 |
072 | 7 |
_aBUS _x083000 _2bisacsh |
|
072 | 7 |
_aBUS _x033070 _2bisacsh |
|
072 | 7 |
_aBUS _x041000 _2bisacsh |
|
072 | 7 |
_aKJC _2bicssc |
|
082 | 0 | 0 |
_a658.4/78 _223 |
100 | 1 |
_aKissoon, Tara, _eauthor. |
|
245 | 1 | 0 |
_aOptimal spending on cybersecurity measures : _brisk management / _cTara Kissoon. |
264 | 1 |
_aAbingdon, Oxon ; _aNew York, NY : _bRoutledge, _c2022. |
|
264 | 4 | _c©2022 | |
300 |
_a1 online resource (vii, 156 pages) : _billustrations. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aRoutledge focus on business and management | |
505 | 0 | _aIntroduction -- Enterprise Risk Management Framework -- Alignment with the Enterprise Risk Management Framework -- Risk Management Practice -- Vulnerability Management -- Risk Management Practice -- System Development Lifecycle -- Risk Management Practice -- Business Continuity Management -- Cybersecurity Risk Management Framework -- Case Studies. | |
520 |
_a"This book explores the strategic decisions made by organizations when implementing cybersecurity controls, leveraging economic models and theories from the economics of information security and risk management frameworks. Based on unique and distinct research completed within the field of risk management and information security, this book provides insight into organizational risk management processes utilized in determining cybersecurity investments. It looks at how theoretical models and frameworks rely on either specific scenarios or controlled conditions, and how decisions on cybersecurity spending within organizations, specifically the funding available in comparison to the recommended security measures necessary for compliance, vary depending on stakeholders. As the trade-off between the costs of implementing a security measure and the benefit derived from the implementation of the security control is not easily measured, a business leader's decision to fund security measures may be biased. The author presents an innovative approach to assess cyber security initiatives with a risk management perspective and leverages a data-centric focus on the evolution of cyber-attacks. This book is ideal for business school students and technology professionals with an interest in risk management"-- _cProvided by publisher. |
||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aRisk management. | |
650 | 7 |
_aBUSINESS & ECONOMICS / Information Management _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS / Insurance / Risk Assessment & Management _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS / Management _2bisacsh |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781003200895 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
999 |
_c5030 _d5030 |