Auditing Information and Cyber Security Governance

Robert E. Davis

Informasi Dasar

21.21.3016
657.450 285
Buku - Elektronik (E-Book)
14 B

A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.

Table of Contents

Subjek

AUDITING OF COMPUTER-PROCESSED ACCOUNTS
 

Katalog

Auditing Information and Cyber Security Governance
978-1-003-09967-3
298p.: pdf file.; 10 MB
Inggris

Sirkulasi

Rp. 0
Rp. 1.000
Tidak

Pengarang

Robert E. Davis
Perorangan
 
 

Penerbit

CRC Press
Florida
2021

Koleksi

Kompetensi

  • ISI6B3 - JAMINAN INFORMASI DAN KEAMANAN
  • CMI7B3 - ANALISIS DATA FORENSIK

Download / Flippingbook

 

Ulasan

Belum ada ulasan yang diberikan
anda harus sign-in untuk memberikan ulasan ke katalog ini