1.4 Information and Cybersecurity Topics

We have covered a lot of ground already, so if this is overwhelming, do not fret. We will be covering all of these topics and more in greater detail as we go along. We will cover what technology managers need to know about cybersecurity ethics, laws, regulations, policies, and governance. We will look at functions performed by various departments and roles. We will explore categories of threats, threat architecture, how threats may be identified and classified according to likelihood and severity, and examine some countermeasures and forms of remediation. We will cover some key technologies in use and on the horizon. We will discuss cryptography and secure software development life cycles. Finally, we ...

Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.