Section 2: Closing the Gap: How to Protect the Organization

Here, we'll explore avenues we can take in implementing security controls to achieve our organization's information security goals.

This section contains the following chapters:

  • Chapter 3, Designing Secure Information Systems
  • Chapter 4, Designing and Protecting Network Security
  • Chapter 5, Controlling Access and Managing Identity
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.174.95