O'Reilly logo

Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

Security monitoring is the success or failure of security in the enterprise. The latest breaches paint this picture clearly; each enterprise had security tools, but no one was watching. The most challenging and most significant role information security can play in an organization is keeping it safe from malicious attacks that threaten the data and sometimes the existence of the enterprise. This starts with sound security architecture, but is played out day-to-day in how well security operations are implemented through management and monitoring of security tools. In this chapter, we discussed approaches to security monitoring based on trust models, network boundaries, protected segments, and asset criticality. We then took a more detailed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required