December 2021
Beginner
550 pages
20h 48m
English
© Ornithopter/Shutterstock
PLANNING FOR SECURE SYSTEMS does not stop once you’ve deployed controls. If you really want to protect yourself from system compromises and data breaches, you have to make sure you are ready for any type of attack. To do that, you evaluate your systems regularly, and that includes all hardware, software, communication channels, and the policies and procedures that govern operations and management. To avoid a compromise, a security audit is one crucial type of evaluation. When you audit a computing environment, you check to see how its operation has met your security goals. ...