Information Security Management Principles, 4th Edition
by Jeremy Green, Andy Taylor, David Alexander, Amanda Finch, David Sutton
4 SECURITY OPERATIONS
This chapter looks at security operations, marking a change in direction from the first three chapters. It also moves into a slightly more technical side of security. We will initially define security operations before focusing on the security side, on how we protect an organisation on a daily basis. We will look at security architecture, threat modelling, vulnerabilities, common attacks, red teaming, malware and social engineering.
DEFINING SECURITY OPERATIONS
Security operations (SecOps) is important for safeguarding assets, including data, intellectual property and the overall IT infrastructure. Effective security operations help to prevent data breaches, minimise the impact of a cyber-attack, ensure compliance ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access