Chapter 13. Event Monitoring, Auditing, and Incident Response
Learning Objectives
After studying this chapter, you should be able to:
Understand the difference between a security event and a security incident
List useful information to collect in security audit trails
Summarize the SP 800-53 security audit controls
Present a typical privacy audit checklist
Present an overview of the privacy incident management process
This chapter deals with activities an organization pursues after privacy controls and policies have been implemented. The key objectives are to assess the effectiveness of the privacy program and to respond to privacy breaches. Sections 13.1 through 13.3 deal with collecting and assessing information related to the effectiveness ...
Get Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.