官术网_书友最值得收藏!

Summary

This chapter has covered foundational concepts in Information Security. In a nutshell, assets such as physical, hardware, software, information and personnel require protection. Protection of assets is based on CIA requirements. CIA values are determined using risk assessment methods (covered in the next chapter). Information security is ensured through security governance and demonstrated through compliance.

Continued in the next chapter are topics, such as understanding and applying risk management concepts, threat modeling, and establishing business continuity requirements in this first domain.

主站蜘蛛池模板: 大关县| 那坡县| 青海省| 富川| 伊春市| 黑水县| 彭阳县| 福州市| 东港市| 奇台县| 策勒县| 西华县| 尉犁县| 阳江市| 漠河县| 定南县| 乌什县| 瑞安市| 泽普县| 鄂伦春自治旗| 明水县| 南川市| 沙湾县| 靖州| 安义县| 商都县| 湘潭县| 拉萨市| 伊春市| 海淀区| 安泽县| 石嘴山市| 通许县| 延长县| 东城区| 绵阳市| 汶川县| 湘潭市| 通州市| 广汉市| 绥棱县|