- Information Security Handbook
- Darren Death
- 94字
- 2021-07-02 21:55:52
Summary
In this chapter, we covered the modern threat landscape so that we can better support:
- The development of our information security program
- Support business/mission goals and objectives
- Develop countermeasures that defend against modern threats
We discussed:
- How to determine what is important to your organization
- Potential threats to your organization
- Types of hackers/adversaries
- Methods used by the hacker/adversary
- Methods of conducting training and awareness as it relates to threats
In the next chapter, we will discuss the activities necessary to establish an enterprise-wide information security program focusing on policies, procedures, standards, and guidelines.
推薦閱讀
- Word 2000、Excel 2000、PowerPoint 2000上機指導與練習
- 人工免疫算法改進及其應用
- 錯覺:AI 如何通過數據挖掘誤導我們
- Drupal 7 Multilingual Sites
- 計算機控制技術
- 中國戰略性新興產業研究與發展·智能制造
- 構建高性能Web站點
- 可編程序控制器應用實訓(三菱機型)
- 傳感器與物聯網技術
- 大學C/C++語言程序設計基礎
- 學練一本通:51單片機應用技術
- Hands-On Dashboard Development with QlikView
- 未來學徒:讀懂人工智能飛馳時代
- Access 2007數據庫入門與實例應用金典
- 基于Quartus Ⅱ的數字系統Verilog HDL設計實例詳解