O'Reilly logo

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies by Steven Hernandez, Corey Schou

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

PART IV

Information Assurance Detection and Recovery Processes

In addition to the preventive controls, organizations should establish capabilities to detect security incidents and anomalies as they occur. Part IV discusses the various controls that organizations could consider. Specifically, Chapter 20 discusses the monitoring tools and methods employed in achieving the objectives.

The maxim that information assurance is a continuous process should be emphasized and made known that it is critical. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required