官术网_书友最值得收藏!

Summary

This chapter has covered foundational concepts in Information Security. In a nutshell, assets such as physical, hardware, software, information and personnel require protection. Protection of assets is based on CIA requirements. CIA values are determined using risk assessment methods (covered in the next chapter). Information security is ensured through security governance and demonstrated through compliance.

Continued in the next chapter are topics, such as understanding and applying risk management concepts, threat modeling, and establishing business continuity requirements in this first domain.

主站蜘蛛池模板: 襄城县| 卓尼县| 阿克| 濮阳县| 库车县| 浮山县| 大新县| 买车| 寻乌县| 临桂县| 盐池县| 密山市| 京山县| 景洪市| 泸水县| 文水县| 郁南县| 新龙县| 元谋县| 盐津县| 郯城县| 临武县| 隆子县| 新营市| 故城县| 临安市| 嘉定区| 桦川县| 翁牛特旗| 山阴县| 抚远县| 神木县| 巴中市| 雅安市| 上犹县| 孟州市| 珲春市| 蓝田县| 孟津县| 凉城县| 洛川县|