An Overview of the IT Risk Management Methodologies for Securing Information Assets

Sayan Mercan Dursun (Fortinet, USA), Meltem Mutluturk (Bogazici University, Turkey), Nazim Taskin (Bogazici University, Turkey) and Bilgin Metin (Bogazici University, Turkey)
Copyright: © 2022 |Pages: 47
EISBN13: 9781668443903|DOI: 10.4018/978-1-7998-7943-5.ch002
OnDemand PDF Download:
$37.50
OnDemand PDF Download
Download link provided immediately after order completion
$37.50

Abstract

Effective information asset management is the basis of information security as well as many other issues. IT risk assessments work well with the proper handling of asset values, and also it is for effectively securing information assets. There is also a wide variety of risk assessment methodologies. This chapter presents information about the overall IT risk management process and methodologies. Best practices are mentioned and occasionally compared based on the requirements of the information technology (IT) sector in practice. This chapter will provide deep knowledge about the IT risk management approach and construction to implementers, risk owners, IT auditors, executive managers, and other IT staff.
InfoSci-OnDemand Powered Search