O'Reilly logo

Assessing Information Security: Strategies, tactics, logic and framework by Andriej Michajlowski, Konstantin Gavrilenko, Andrew Vladimirov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 1: INFORMATION SECURITY AUDITING AND STRATEGY

We should base our decisions on awareness rather than on mechanical habit. That is, we act on a keen appreciation for the essential factors that make each situation unique instead of from conditioned response.’ – MCDP 1 Warfighting

Rephrasing Clausewitz, to produce a workable scheme for information security assessments is one of the tasks that are inherently simple, yet the simplest thing is difficult to implement. It is simple because the underlying logic is clear. It can be formulated in a minute. Here it comes from the (independent) auditor’s viewpoint:

  • Find out about the assessment’s goals and conditions.
  • Plan the appropriate actions.
  • Select the corresponding methodologies and tools. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required