官术网_书友最值得收藏!

Summary

In this chapter, we covered the modern threat landscape so that we can better support:

  • The development of our information security program
  • Support business/mission goals and objectives
  • Develop countermeasures that defend against modern threats

We discussed:

  • How to determine what is important to your organization
  • Potential threats to your organization
  • Types of hackers/adversaries
  • Methods used by the hacker/adversary
  • Methods of conducting training and awareness as it relates to threats

In the next chapter, we will discuss the activities necessary to establish an enterprise-wide information security program focusing on policies, procedures, standards, and guidelines.

主站蜘蛛池模板: 偏关县| 平罗县| 赣州市| 固安县| 福安市| 民权县| 南江县| 含山县| 开平市| 若尔盖县| 甘孜县| 大姚县| 东乡族自治县| 东平县| 华安县| 饶阳县| 名山县| 开封县| 嵊州市| 建昌县| 宁晋县| 赤水市| 洛隆县| 醴陵市| 外汇| 会泽县| 宿州市| 修文县| 盘锦市| 石渠县| 农安县| 江川县| 抚宁县| 瑞安市| 大方县| 伊宁县| 北宁市| 岚皋县| 石家庄市| 大宁县| 额尔古纳市|