PART II
As with any management practice, information assurance starts with comprehensive planning. Part II examines the practical considerations made when planning and establishing an information assurance management program. Central to the management program is establishing an information assurance management system (IAMS), which was discussed in Chapter 2
Get Information Assurance Handbook: Effective Computer Security and Risk Management Strategies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.