Skip to Main Content
Auditing IT Infrastructures for Compliance, 2nd Edition
book

Auditing IT Infrastructures for Compliance, 2nd Edition

by Marty Weiss, Michael G. Solomon
July 2015
Intermediate to advanced content levelIntermediate to advanced
398 pages
12h 40m
English
Jones & Bartlett Learning
Content preview from Auditing IT Infrastructures for Compliance, 2nd Edition

CHAPTER 9

Compliance Within the Workstation Domain

COMPLYING WITH SECURITY-RELATED REGULATIONS, legislation, and other requirements means ensuring your organization protects the security of your information. In most cases, ensuring information security means ensuring users take appropriate actions and refrain from inappropriate actions. Although the directive seems simple, implementing it can be complex.

If all users were perfect and completely compliant, there wouldn’t be a need to consider any further security layers. Remember that users include both authorized and unauthorized users. Attackers fall into the category of unauthorized users. Because users are imperfect and often noncompliant, you must include additional layers of security controls ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Auditing IT Infrastructures for Compliance, 3rd Edition

Auditing IT Infrastructures for Compliance, 3rd Edition

Robert Johnson, Marty Weiss, Michael G. Solomon

Publisher Resources

ISBN: 9781284090703