Chapter 11 Automated Tools

Our Age of Anxiety is, in great part, the result of trying to do today’s jobs with yesterday’s tools.

Marshall McLuhan

In this chapter, you will learn to recognize the value and limitations of automated information assurance tools. This chapter discusses the automated tools that can be used to protect your information, and the tools that attackers use to attempt to access and compromise your automated information.*

A variety of weaknesses can leave information vulnerable to compromise. For example, information is vulnerable when (1) inexperienced or untrained users accidentally violate good security practices by, for example, inadvertently publicizing their passwords, (2) weak passwords are chosen which can be ...

Get Building A Global Information Assurance Program now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.