Skip to Main Content
Infosec Strategies and Best Practices
book

Infosec Strategies and Best Practices

by Joseph MacMillan
May 2021
Beginner content levelBeginner
272 pages
6h 50m
English
Packt Publishing
Content preview from Infosec Strategies and Best Practices

Chapter 3: Designing Secure Information Systems

In the previous chapter, we talked about how to protect assets with controls that have been applied based on risk, but there is so much more that can be done. What more can be done?, you ask, bursting from sheer excitement. Well…, I reply, and softly smile to myself: What if we just designed the systems with security in mind from the beginning? Your face lights up, and the stars create tracers as the world whirls around us.

No—but seriously, we should be designing our systems with security in mind from the beginning. That's what this chapter is about. By the way, I don't mean design the same way a man (who is still standing on a Segway scooter inside the elevator of your building with you) says ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Vulnerability Management

Practical Vulnerability Management

Andrew Magnusson

Publisher Resources

ISBN: 9781800566354