Chapter 3
Goals of Security
Goals of Security—SMART/OKR
When does the first step—taking care of security in information technology or in a project—start, and when does it actually end? The short answers to these questions are from the day the project is initiated and never, respectively. However, those answers need further explanation.
Vulnerabilities in IT security can start from the very beginning, and ignoring them can cause them to escalate and become huge problems to fix later. This is the reason security for the project—whether an IT project or otherwise—needs to be considered from the beginning. As the project progresses, vulnerabilities are tested for at regular intervals during the development, testing, and deployment phases. Even ...
Get Database and Application Security: A Practitioner's Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.