CHAPTER SUMMARY
In this chapter, you learned that security professionals must understand that security operations and administration are the basis of any solid security program and how security administration works to plan, design, implement, and monitor an organization’s security plan. You learned that professional ethics are essential for every solid security plan and what you have to do to make sure a security program is compliant. You learned how the policies, standards, guidelines, and procedures of a plan work together to shape a security program and how data classification standards affect the decision-making process. You learned how to use configuration management to manage system modifications and how configuration control and change ...