O'Reilly logo

Assessing Information Security: Strategies, tactics, logic and framework by Andriej Michajlowski, Konstantin Gavrilenko, Andrew Vladimirov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5: SECURITY AUDIT STRATEGIES AND TACTICS

In military operations, what is valued is foiling the opponent’s strategy, not pitched battle’. – Wang Xi.

The previous chapters put heavy emphasis on governance, management and policy issues in relation to assessing information security. They are also heavily centred on the issues of strategic significance. It is time to pull up your sleeves and dive into the realm of tactics. Inevitably, this means that the upcoming discourse will have to be more technically inclined. As stated in this book’s preface, however, providing detailed checklists or hands-on testing manuals is not the intended goal. We are not competing with, for example, OSSTMM (Open Source Security Testing Methodology Manual), not ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required