- CISSP in 21 Days(Second Edition)
- M. L. Srinivasan
- 82字
- 2021-07-14 11:04:27
Summary
This chapter has covered foundational concepts in Information Security. In a nutshell, assets such as physical, hardware, software, information and personnel require protection. Protection of assets is based on CIA requirements. CIA values are determined using risk assessment methods (covered in the next chapter). Information security is ensured through security governance and demonstrated through compliance.
Continued in the next chapter are topics, such as understanding and applying risk management concepts, threat modeling, and establishing business continuity requirements in this first domain.
推薦閱讀
- FuelPHP Application Development Blueprints
- Python for Secret Agents:Volume II
- Visual Basic程序設計(第3版):學習指導與練習
- JavaScript+jQuery開發實戰
- AngularJS深度剖析與最佳實踐
- 單片機應用技術
- Building Serverless Applications with Python
- Angular開發入門與實戰
- 微服務從小白到專家:Spring Cloud和Kubernetes實戰
- Instant PHP Web Scraping
- Apache Camel Developer's Cookbook
- 運維前線:一線運維專家的運維方法、技巧與實踐
- IoT Projects with Bluetooth Low Energy
- Xamarin Blueprints
- 單片機原理及應用技術