官术网_书友最值得收藏!

Summary

This chapter has covered foundational concepts in Information Security. In a nutshell, assets such as physical, hardware, software, information and personnel require protection. Protection of assets is based on CIA requirements. CIA values are determined using risk assessment methods (covered in the next chapter). Information security is ensured through security governance and demonstrated through compliance.

Continued in the next chapter are topics, such as understanding and applying risk management concepts, threat modeling, and establishing business continuity requirements in this first domain.

主站蜘蛛池模板: 咸宁市| 得荣县| 岑溪市| 大渡口区| 巴马| 石门县| 盘锦市| 漳平市| 鲁甸县| 巴青县| 天台县| 普洱| 成武县| 海林市| 岳普湖县| 京山县| 邛崃市| 嘉峪关市| 行唐县| 视频| 千阳县| 南川市| 于都县| 右玉县| 阜新| 朝阳区| 温州市| 江北区| 江山市| 华蓥市| 德清县| 甘泉县| 宁陵县| 陇川县| 奈曼旗| 渑池县| 庆城县| 渭南市| 台前县| 辉县市| 板桥市|