Information Security Risk Analysis, Third Edition

Thomas R. Peltier

March 16, 2010 by Auerbach Publications
Reference - 456 Pages - 105 B/W Illustrations
ISBN 9781439839560 - CAT# K11810


Add to Wish List
FREE Standard Shipping!


  • Includes a review of risk analysis, risk assessment, and vulnerability assessments
  • Introduces System Development Life Cycle (SDLC) and Business Process Life Cycle (BPLC), and integrates risk analysis and assessment into these processes
  • Discusses the need to develop a standard set of controls, and details how to apply regulations such as GLBA, HIPPA, SOX, ISO 17799, and others
  • Explains how to use qualitative risk assessment concepts and FRAAP to conduct business impact analyses and determine information classification requirements
  • Contains samples of forms, controls, policies, letters, and spreadsheets needed to complete the risk analysis and assessment processes that can be found here.


Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. Information Security Risk Analysis, Third Edition demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to your organization.

Providing access to more than 350 pages of helpful ancillary materials, this volume:

  • Presents and explains the key components of risk management
  • Demonstrates how the components of risk management are absolutely necessary and work in your organization and business situation
  • Shows how a cost-benefit analysis is part of risk management and how this analysis is performed as part of risk mitigation
  • Explains how to draw up an action plan to protect the assets of your organization when the risk assessment process concludes
  • Examines the difference between a Gap Analysis and a Security or Controls Assessment
  • Presents case studies and examples of all risk management components

Authored by renowned security expert and certification instructor, Thomas Peltier, this authoritative reference provides you with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment in a matter of days. Supplemented with user-friendly checklists, forms, questionnaires, sample assessments, and other documents, this work is truly a one-stop, how-to resource for industry and academia professionals.

Share this Title