Understanding the IT Security Process
As defined earlier in Chapter 2, “Foundations and Principles of Security,” designing and implementing a sound IT security architecture and framework requires a thorough analysis and examination of how availability, integrity, and availability (A-I-C Triad) is designed and implemented on the IT infrastructure components and assets in the overall information security plan.
Attacks on an IT infrastructure and assets can disrupt availability of service resulting in the following:
Loss of Productivity— Downtime equals lost productivity to organizations. Lost productivity can result in loss in dollars and time.
Violation of Service Level Agreements— Service providers or outsourcing service organizations can be ...
Get Inside Network Security Assessment: Guarding Your IT Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.