O'Reilly logo

Inside Network Security Assessment: Guarding Your IT Infrastructure by David Kim, Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding the IT Security Process

As defined earlier in Chapter 2, “Foundations and Principles of Security,” designing and implementing a sound IT security architecture and framework requires a thorough analysis and examination of how availability, integrity, and availability (A-I-C Triad) is designed and implemented on the IT infrastructure components and assets in the overall information security plan.

Attacks on an IT infrastructure and assets can disrupt availability of service resulting in the following:

  • Loss of Productivity— Downtime equals lost productivity to organizations. Lost productivity can result in loss in dollars and time.

  • Violation of Service Level Agreements— Service providers or outsourcing service organizations can be ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required