Home > Computing and Information Technology > Computer security > Data encryption > Managing Information Security Risks: The OCTAVE (SM) Approach(SEI Series in Software Engineering)
9%
Managing Information Security Risks: The OCTAVE (SM) Approach(SEI Series in Software Engineering)

Managing Information Security Risks: The OCTAVE (SM) Approach(SEI Series in Software Engineering)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

From the CERT Coordination Center at the SEI, this book describes OCTAVE, a new method of evaluating information security risk.@BULLET = This book is from the CERT Coordination Center and Networked Systems Survivability (NSS) group at the SEI, the Software Engineering Institute at Carnegie Mellon University. @BULLET = There is growing interest in OCTAVE. The DOD Medical Health System is one early adopter and there is also keen interest from the financial sector. @BULLET = The authors are the lead developers of the OCTAVE method and are experts in helping organizations manage their own security risks.@SUMMARY = This is a descriptive and process-oriented book on a new security risk evaluation method, OCTAVE. OCTAVE stands for Operationally Critical Threat, Asset, and Vulnerability Evaluation (SM). An information security risk evaluation helps organizations evaluate organizational practice as well as the installed technology base and to make decisions based on potential impact.@AUTHBIO = Christopher Alberts is a senior member of the technical staff in the Networked Systems Survivability Program (NSS) at the SEI, CERT Coordination Center. He is team leader for security evaluations and OCTAVE. Christopher is responsible for developing information security risk management methods, tools, and techniques. Audrey Dorofee is a senior member of the technical staff in the Survivable Network Management Project in the NSS Program at SEI, CERT Coordination Center. CERT is the original computer security incident response center and is internationally recognized as a leading authoritative organization in this area.

Table of Contents:
List of Figures. List of Tables. Preface. Acknowledgments. I. INTRODUCTION. 1. Managing Information Security Risks. Information Security. What Is Information Security? Vulnerability Assessment. Information Systems Audit. Information Security Risk Evaluation. Managed Service Providers. Implementing a Risk Management Approach. Information Security Risk Evaluation and Management. Evaluation Activities. Risk Evaluation and Management. An Approach to Information Security Risk Evaluations. OCTAVE Approach. Information Security Risk. Three Phases. OCTAVE Variations. Common Elements. 2. Principles and Attributes of Information Security Risk Evaluations. Introduction. Information Security Risk Management Principles. Information Security Risk Evaluation Principles. Risk Management Principles. Organizational and Cultural Principles. Information Security Risk Evaluation Attributes. Information Security Risk Evaluation Outputs. Phase 1: Build Asset-BasedThreat Profiles. Phase 2: Identify InfrastructureVulnerabilities. Phase 3: Develop Security Strategy and Plans. II. THE OCTAVE METHOD. 3. Introduction to the OCTAVE Method. Overview of the OCTAVE Method. Preparation. Phase 1: Build Asset-Based Threat Profiles. Phase 2: Identify InfrastructureVulnerabilities. Phase 3: Develop Security Strategyand Plans. Mapping Attributes and Outputs to the OCTAVE Method. Attributes and the OCTAVE Method. Outputs and the OCTAVE Method. Introduction to the Sample Scenario. 4. Preparing for OCTAVE. Overview of Preparation. Obtain Senior Management Sponsorship of OCTAVE. Select Analysis Team Members. Select Operational Areas to Participatein OCTAVE. Select Participants. Coordinate Logistics. Sample Scenario. 5. Identifying Organizational Knowledge(Processes 1 to 3). Overview of Processes 1 to 3. Identify Assets and Relative Priorities. Identify Areas of Concern. Identify Security Requirements for MostImportant Assets. Capture Knowledge of Current Security Practices and Organizational Vulnerabilities. 6. Creating Threat Profiles (Process 4). Overview of Process 4. Before the Workshop: Consolidate Information from Processes 1 to 3. Select Critical Assets. Refine Security Requirements for Critical Assets. Identify Threats to Critical Assets. 7. Identifying Key Components (Process 5). Overview of Process 5. Identify Key Classes of Components. Identify Infrastructure Components to Examine. 8. Evaluating Selected Components (Process 6). Overview of Process 6. Before the Workshop: Run Vulnerability Evaluation Tools on Selected Infrastructure Components. Review Technology Vulnerabilities and Summarize Results. 9. Conducting the Risk Analysis (Process 7). Overview of Process 7. Identify the Impact of Threats to Critical Assets. Create Risk Evaluation Criteria. Evaluate the Impact of Threats to Critical Assets. Incorporating Probability into the Risk Analysis. What Is Probability? Probability in the OCTAVE Method. 10. Developing a Protection Strategy—Workshop A (Process 8A). Overview of Process 8A. Before the Workshop: Consolidate Information from Processes 1 to 3. Review Risk Information. Create Protection Strategy. Create Risk Mitigation Plans. Create Action List. Incorporating Probability into Risk Mitigation. 11. Developing a Protection Strategy--Workshop B (Process 8B). Overview of Process 8B. Before the Workshop: Prepare to Meet with Senior Management. Present Risk Information. Review and Refine Protection Strategy, Mitigation Plans, and Action List. Create Next Steps. Summary of Part II. III. VARIATIONS ON THE OCTAVE APPROACH. 12. An Introduction to Tailoring OCTAVE. The Range of Possibilities. Tailoring the OCTAVE Method to Your Organization. Tailoring the Evaluation. Tailoring Artifacts. 13. Practical Applications. Introduction. The Small Organization. Company S. Implementing OCTAVE in Small Organizations. Very Large, Dispersed Organizations. Integrated Web Portal Service Providers. Large and Small Organizations. Other Considerations. 14. Information Security Risk Management. Introduction. A Framework for Managing Information Security Risks. Identify. Analyze. Plan. Implement. Monitor. Control. Implementing Information Security Risk Management. Summary. Glossary. Bibliography. Appendix A. Case Scenario for the OCTAVE Method. MedSite OCTAVE Final Report: Introduction. Protection Strategy for MedSite. Near-Term Action Items. Risks and Mitigation Plans for Critical Assets. Paper Medical Records. Personal Computers. PIDS. ABC Systems. ECDS. Technology Vulnerability Evaluation Results and Recommended Actions. Additional Information. Risk Impact Evaluation Criteria. Other Assets. Consolidated Survey Results. Appendix B. Worksheets. Knowledge Elicitation Worksheets. Asset Worksheet. Areas of Concern Worksheet. Security Requirements Worksheet. Practice Surveys. Protection Strategy Worksheet. Asset Profile Worksheets. Critical Asset Information. Security Requirements. Threat Profile for Critical Asset. System(s) of Interest. Key Classes of Components. Infrastructure Components to Examine. Summarize Technology Vulnerabilities. Record Action Items. Risk Impact Descriptions. Risk Evaluation Criteria Worksheet. Risk Profile Worksheet. Risk Mitigation Plans. Strategies and Actions. Current Security Practices Worksheets. Protection Strategy Worksheets. Action List Worksheet. Appendix C. Catalog of Practices. About the Authors. Index. 0321118863T03112002


Best Sellers


Product Details
  • ISBN-13: 9780321118868
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison-Wesley Educational Publishers Inc
  • Depth: 32
  • Language: English
  • Returnable: N
  • Spine Width: 32 mm
  • Weight: 1080 gr
  • ISBN-10: 0321118863
  • Publisher Date: 19 Jul 2002
  • Binding: Hardback
  • Height: 242 mm
  • No of Pages: 520
  • Series Title: SEI Series in Software Engineering
  • Sub Title: The OCTAVE (SM) Approach
  • Width: 193 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Managing Information Security Risks: The OCTAVE (SM) Approach(SEI Series in Software Engineering)
Pearson Education (US) -
Managing Information Security Risks: The OCTAVE (SM) Approach(SEI Series in Software Engineering)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Managing Information Security Risks: The OCTAVE (SM) Approach(SEI Series in Software Engineering)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA