官术网_书友最值得收藏!

Summary

In this chapter, we covered the modern threat landscape so that we can better support:

  • The development of our information security program
  • Support business/mission goals and objectives
  • Develop countermeasures that defend against modern threats

We discussed:

  • How to determine what is important to your organization
  • Potential threats to your organization
  • Types of hackers/adversaries
  • Methods used by the hacker/adversary
  • Methods of conducting training and awareness as it relates to threats

In the next chapter, we will discuss the activities necessary to establish an enterprise-wide information security program focusing on policies, procedures, standards, and guidelines.

主站蜘蛛池模板: 山东省| 杭锦后旗| 长乐市| 内江市| 容城县| 酉阳| 丹江口市| 邯郸市| 临武县| 吉隆县| 西峡县| 黎平县| 黔西县| 乐业县| 湘阴县| 甘泉县| 喜德县| 正阳县| 永康市| 常山县| 澎湖县| 三亚市| 海门市| 陆河县| 万宁市| 芜湖县| 屏东市| 深州市| 青州市| 宜良县| 蒙自县| 镇安县| 盱眙县| 东乌珠穆沁旗| 寿宁县| 蓬安县| 日照市| 通渭县| 清苑县| 昭觉县| 永安市|