- Information Security Handbook
- Darren Death
- 94字
- 2021-07-02 21:55:52
Summary
In this chapter, we covered the modern threat landscape so that we can better support:
- The development of our information security program
- Support business/mission goals and objectives
- Develop countermeasures that defend against modern threats
We discussed:
- How to determine what is important to your organization
- Potential threats to your organization
- Types of hackers/adversaries
- Methods used by the hacker/adversary
- Methods of conducting training and awareness as it relates to threats
In the next chapter, we will discuss the activities necessary to establish an enterprise-wide information security program focusing on policies, procedures, standards, and guidelines.
推薦閱讀
- Mastering Spark for Data Science
- Cloud Analytics with Microsoft Azure
- Python Data Science Essentials
- 網絡布線與小型局域網搭建
- 運動控制系統
- Visual Studio 2010 (C#) Windows數據庫項目開發
- 貫通Java Web輕量級應用開發
- 基于Proteus的PIC單片機C語言程序設計與仿真
- 項目實踐精解:C#核心技術應用開發
- 網頁設計與制作
- 單片機C51應用技術
- 分布式Java應用
- SQL Server 2019 Administrator's Guide
- 探索中國物聯網之路
- R Programming By Example