Section 2: Closing the Gap: How to Protect the Organization
Here, we'll explore avenues we can take in implementing security controls to achieve our organization's information security goals.
This section contains the following chapters:
- Chapter 3, Designing Secure Information Systems
- Chapter 4, Designing and Protecting Network Security
- Chapter 5, Controlling Access and Managing Identity
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.