PART IV

Information Assurance Detection and Recovery Processes

In addition to the preventive controls, organizations should establish capabilities to detect security incidents and anomalies as they occur. Part IV discusses the various controls that organizations could consider. Specifically, Chapter 20 discusses the monitoring tools and methods employed in achieving the objectives.

The maxim that information assurance is a continuous process should be emphasized and made known that it is critical. ...

Get Information Assurance Handbook: Effective Computer Security and Risk Management Strategies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.