Books > Computing & IT > Computer hardware & operating systems > Systems management
|
Buy Now
Securing an IT Organization through Governance, Risk Management, and Audit (Hardcover)
Loot Price: R2,061
Discovery Miles 20 610
|
|
Securing an IT Organization through Governance, Risk Management, and Audit (Hardcover)
Series: Internal Audit and IT Audit
Expected to ship within 12 - 17 working days
|
Past events have shed light on the vulnerability of
mission-critical computer systems at highly sensitive levels. It
has been demonstrated that common hackers can use tools and
techniques downloaded from the Internet to attack government and
commercial information systems. Although threats may come from
mischief makers and pranksters, they are more likely to result from
hackers working in concert for profit, hackers working under the
protection of nation states, or malicious insiders. Securing an IT
Organization through Governance, Risk Management, and Audit
introduces two internationally recognized bodies of knowledge:
Control Objectives for Information and Related Technology (COBIT 5)
from a cybersecurity perspective and the NIST Framework for
Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing
the processes directly related to governance, risk management, and
audit, the book provides details of a cybersecurity framework
(CSF), mapping each of the CSF steps and activities to the methods
defined in COBIT 5. This method leverages operational risk
understanding in a business context, allowing the information and
communications technology (ICT) organization to convert high-level
enterprise goals into manageable, specific goals rather than
unintegrated checklist models. The real value of this methodology
is to reduce the knowledge fog that frequently engulfs senior
business management, and results in the false conclusion that
overseeing security controls for information systems is not a
leadership role or responsibility but a technical management task.
By carefully reading, implementing, and practicing the techniques
and methodologies outlined in this book, you can successfully
implement a plan that increases security and lowers risk for you
and your organization.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.