8.2 Security Models and Countermeasures
Now that we have reviewed some of the basics in computer architecture, let’s consider security models and countermeasures. Among the primary cybersecurity tools for technology managers and other security professionals are security policies. Because security policies define how information and systems assets are to be used and governed, they differ somewhat from other organizational policies. Security policies are either documents that establish the rules and punitive sanctions regarding security behaviors, for instance they may dictate that users must change their passwords monthly, or they consist of facilities that are codified into information and communications systems that define the rules and permissions ...
Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.