Chapter 24: Information Security Essentials for IT Managers: Protecting Mission-Critical Systems

Jim Harmening     Cybersecurity & Risk Management, Illinois Commerce Commission, Chicago, IL, United States

Abstract

Good policies and procedures are essential to the success of every information technology (IT) manager. Being agile in a constantly changing world will help you succeed in the long run. Knowing your assets, protecting them, and utilizing a risk-based approach to your security plans, policies, and procedures will make you prosper. Make sure you consider how you are handling data. The three key principles of data confidentiality, integrity, and availability will come in handy.

Keywords

Access control; Application security; Cybersecurity; Cybersecurity ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.