- CISSP in 21 Days(Second Edition)
- M. L. Srinivasan
- 82字
- 2021-07-14 11:04:27
Summary
This chapter has covered foundational concepts in Information Security. In a nutshell, assets such as physical, hardware, software, information and personnel require protection. Protection of assets is based on CIA requirements. CIA values are determined using risk assessment methods (covered in the next chapter). Information security is ensured through security governance and demonstrated through compliance.
Continued in the next chapter are topics, such as understanding and applying risk management concepts, threat modeling, and establishing business continuity requirements in this first domain.
推薦閱讀
- JavaScript全程指南
- MATLAB應(yīng)用與實驗教程
- Processing互動編程藝術(shù)
- Python應(yīng)用輕松入門
- Reactive Programming With Java 9
- OpenShift在企業(yè)中的實踐:PaaS DevOps微服務(wù)(第2版)
- Learning Raspbian
- PLC應(yīng)用技術(shù)(三菱FX2N系列)
- Go語言編程
- uni-app跨平臺開發(fā)與應(yīng)用從入門到實踐
- 軟技能2:軟件開發(fā)者職業(yè)生涯指南
- Mastering Unity 2017 Game Development with C#(Second Edition)
- Swift iOS Programming for Kids
- Analytics for the Internet of Things(IoT)
- 亮劍Java Web項目開發(fā)案例導(dǎo)航