- Information Security Handbook
- Darren Death
- 112字
- 2021-07-02 21:55:49
Summary
In this chapter, we covered introductory topics on implementing an effective information security program. We discussed the following:
- Information security challenges faced by the organization and the information security program
- The evolution of cybercrime over time and its impact
- The role of information security in the organization
- The concept of confidentiality, integrity, and availability
- An introduction to information security assessments
- An introduction to risk management
- The roles of information security standards and training
- How awareness and training benefit the organization
In the next chapter, we will define the threat landscape. We will be discussing the people, processes, and technologies that need to be defended against to ensure your organization's continued security.
推薦閱讀
- Linux Mint System Administrator’s Beginner's Guide
- TestStand工業自動化測試管理(典藏版)
- Getting Started with MariaDB
- Visual C# 2008開發技術詳解
- 群體智能與數據挖掘
- 21天學通C#
- Implementing Oracle API Platform Cloud Service
- Docker High Performance(Second Edition)
- 數據掘金
- 智能生產線的重構方法
- Linux系統下C程序開發詳解
- 中國戰略性新興產業研究與發展·數控系統
- 新一代人工智能與語音識別
- DynamoDB Applied Design Patterns
- Machine Learning in Java