Chapter 14

Technical Security Management

“I am fairly familiar with all the forms of secret writings, and am myself the author of a trifling monograph upon the subject, in which I analyze one hundred and sixty separate ciphers,” said Holmes.

The Adventure of the Dancing Men, Sir Arthur Conan Doyle

Learning Objectives

After studying this chapter, you should be able to:

  • Explain the purpose and key characteristics of a security architecture.

  • Discuss malware protection strategies.

  • Understand the requirements for malware protection software.

  • Present an overview of identity and access management concepts.

  • Describe the principal approaches to intrusion detection.

  • Explain the key elements in a data loss prevention solution.

  • Understand the basic concepts ...

Get Effective Cybersecurity: A Guide to Using Best Practices and Standards now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.