10% off all books and free delivery over £50
Buy from our bookstore and 25% of the cover price will be given to a school of your choice to buy more books. *15% of eBooks.

Auditing Information and Cyber Security Governance

View All Editions (2)

The selected edition of this book is not available to buy right now.
Add To Wishlist
Write A Review

About

Auditing Information and Cyber Security Governance Synopsis

"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom."

- Ronald W. Hull, author, poet, and former professor and university administrator

A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.

About This Edition

ISBN: 9781032044484
Publication date:
Author: Robert Elliot Davis
Publisher: CRC Press
Format: Paperback
Pagination: 284 pages
Series: Security, Audit and Leadership Series
Genres: Digital and information technologies: Legal aspects
Management accounting, bookkeeping and auditing
Business strategy
Hospitality and service industries
Network management
Computer science
Computer security