官术网_书友最值得收藏!

Summary

In this chapter, we covered introductory topics on implementing an effective information security program. We discussed the following:

  • Information security challenges faced by the organization and the information security program
  • The evolution of cybercrime over time and its impact
  • The role of information security in the organization
  • The concept of confidentiality, integrity, and availability
  • An introduction to information security assessments
  • An introduction to risk management
  • The roles of information security standards and training
  • How awareness and training benefit the organization

In the next chapter, we will define the threat landscape. We will be discussing the people, processes, and technologies that need to be defended against to ensure your organization's continued security.

主站蜘蛛池模板: 永嘉县| 沐川县| 镇坪县| 黎城县| 勃利县| 工布江达县| 庆安县| 星座| 青龙| 余庆县| 江都市| 浙江省| 横峰县| 崇文区| 昌邑市| 黄骅市| 富宁县| 合作市| 晋中市| 麻栗坡县| 汉沽区| 昭苏县| 夹江县| 丘北县| 抚宁县| 阿拉善左旗| 齐齐哈尔市| 塘沽区| 策勒县| 阳新县| 津市市| 望城县| 襄汾县| 八宿县| SHOW| 九台市| 阿图什市| 三门峡市| 崇文区| 辽宁省| 荥阳市|