Security objectives and controls

The CISSP targets the protection of information systems and information assets. Please remember that although focused mainly on inanimate assets such as databases and file servers, the protection of human safety is always the top priority. With the people safe, you can turn your sights toward the protection of these valuable information assets.

The collection of valuable information assets includes all the data files stored on any of the computers the organization owns, on every database, every Microsoft Word document, and every spreadsheet. The assets also include everything required to make these assets available to the workers and business decision makers, such as the hard disk drives that store the files, the ...

Get CISSP Training Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.