O'Reilly logo

CISSP in 21 Days by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security management practices

Information security has long been considered to be purely related to Information Technology (IT) and its components that are technical in nature. In other words, technology-related controls are thought to be sufficient to mitigate the information security risks. However, this misconception is proved to be untrue as organizations started realizing that information security consists of management and administration related controls that may not be technical at all. For example, a firewall is a technical means of filtering traffic coming into and going out of an organization's IT network. The reason for using such a device is to allow legitimate packets of data in and out of the network and block unauthorized or malicious ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required