Cybersecurity Risk Management
Peer Review for material titled "Cybersecurity Risk Management"
User Rating for material titled "Cybersecurity Risk Management"
Member Comments for material titled "Cybersecurity Risk Management"
Personal Collections for material titled "Cybersecurity Risk Management"
Learning Exercises for material titled "Cybersecurity Risk Management"
Accessibility Info for material titled "Cybersecurity Risk Management"
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II




        

Search > Material Results >

Cybersecurity Risk Management

        

Cybersecurity Risk Management

Logo for Cybersecurity Risk Management
Cybersecurity Risk Management is an online resource developed for researchers and practitioners.  The site provides links to individuals, organizations,  and publication outlets.  A 28 slide PowerPoint presentation is also available for download that covers basic concepts, risk metrics, methods for managing cybersecurity risk, the risk management process, and cybersecurity risk management and firm value.
Material Type: Collection
Date Added to MERLOT: December 28, 2006
Date Modified in MERLOT: June 04, 2008
Author:
Send email to lgordon@rhsmith.umd.edu
Submitter: Susan Moncada

Quality


About

Primary Audience: College Lower Division, College Upper Division, Graduate School, Professional
Mobile Compatibility: Not specified at this time
Technical Requirements: Internet Exployer and PowerPoint
Language: English
Cost Involved: no
Source Code Available: unsure
Accessiblity Information Available: unsure
Creative Commons: unsure

Connections





QR Code for this Page

Browse in Categories

Discussion

Discussion for Cybersecurity Risk Management

Log in to participate in the discussions or Register if you are not already a MERLOT member.

Return to Top of Page