O'Reilly logo

CISSP All-in-One Exam Guide, Eighth Edition, 8th Edition by Fernando Maymi, Shon Harris

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER     1

Security and Risk Management

This chapter presents the following:

•  Security terminology and principles

•  Protection control types

•  Security frameworks, models, standards, and best practices

•  Computer laws and crimes

•  Intellectual property

•  Data breaches

•  Risk management

•  Threat modeling

•  Business continuity and disaster recovery

•  Personnel security

•  Security governance

The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards—and even then I have my doubts.

—Eugene H. Spafford

In reality, organizations have many other things to do than practice security. Businesses exist to make money. Most nonprofit organizations exist to offer ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required