- Information Security Handbook
- Darren Death
- 113字
- 2021-07-02 21:55:55
Recommended operational policies
Information security policies can be broken down into three categories:
- Technical controls: The security controls (that is, safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software, or firmware components of the system
- Management controls: The security controls (that is, safeguards or countermeasures) for an information system that focuses on the management of risk and the management of information system security
- Operational controls: The security controls (that is, safeguards or countermeasures) for an information system that primarily are implemented and executed by people (as opposed to systems)
More information on information security policies is as follows:

推薦閱讀
- Dreamweaver CS3 Ajax網(wǎng)頁(yè)設(shè)計(jì)入門與實(shí)例詳解
- Mastering Proxmox(Third Edition)
- 構(gòu)建高質(zhì)量的C#代碼
- 工業(yè)機(jī)器人技術(shù)及應(yīng)用
- Getting Started with MariaDB
- 變頻器、軟啟動(dòng)器及PLC實(shí)用技術(shù)260問
- Linux:Powerful Server Administration
- Mastering Game Development with Unreal Engine 4(Second Edition)
- 教育機(jī)器人的風(fēng)口:全球發(fā)展現(xiàn)狀及趨勢(shì)
- 精通LabVIEW程序設(shè)計(jì)
- 基于RPA技術(shù)財(cái)務(wù)機(jī)器人的應(yīng)用與研究
- Learning Cassandra for Administrators
- 智能小車機(jī)器人制作大全(第2版)
- 實(shí)戰(zhàn)大數(shù)據(jù)(Hadoop+Spark+Flink):從平臺(tái)構(gòu)建到交互式數(shù)據(jù)分析(離線/實(shí)時(shí))
- 深度學(xué)習(xí)之模型優(yōu)化:核心算法與案例實(shí)踐