O'Reilly logo

Assessing Information Security: Strategies, tactics, logic and framework by A Michajlowski, K Gavrilenko, A Vladimirov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Security Audit Strategies and Tactics

 

‘In military operations, what is valued is foiling the opponent’s strategy, not pitched battle.’

 
 --Wang Xi.

The previous chapters put heavy emphasis on governance, management and policy issues in relation to assessing information security. They are also heavily centred on the issues of strategic significance. It is time to pull up the sleeves and dive into the realm of tactics. Inevitably, this means that the upcoming discourse will have to be more technically inclined. However, as stated in this book’s preface, providing detailed checklists or hands-on testing manuals is not the intended goal. We are not competing with, for example, OSSTMM (Open Source Security Testing Methodology Manual), not ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required