Abstract
This chapter highlights the role of risk assessment methods in the review of risk related to management information systems. Thus, risk assessment methodologies and exercises that are conducted on information systems security. The primary task here is to understand the processes and stages generally involved in implementing an (ISMS) information security management system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science+Business Media New York
About this chapter
Cite this chapter
Williams, G. (2004). Risk Assessment, Policies and Standards. In: Synchronizing E-Security. Advances in Information Security, vol 10. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-0493-1_3
Download citation
DOI: https://doi.org/10.1007/978-1-4615-0493-1_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-5104-7
Online ISBN: 978-1-4615-0493-1
eBook Packages: Springer Book Archive