Summary

In this chapter, we presented the idea of building a trust model constructed from building blocks of information. Once the trust model is built and enterprise risk has been assessed, the model can be applied to various types of data and data interactions. Agility in security can be achieved if data is the center of the analysis, providing determination of the required security mechanisms to reduce risk and support business initiatives. The next chapter will cover security as a process, supporting the developed security architecture.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.74.231