Chapter 16. Strategic Security

Introduction

Just as IT infrastructures have evolved from mainframes to the Internet, so also have security systems. The process that began primarily as a means to protect mainframe operating systems now must protect applications, databases, networks, and desktops—not to mention the Internet and its companions, extranets, and intranets. While there are dedicated security processes that pertain to each of these entities, there needs to be a strategic security process governing the integration and compatibility of these specialized systems.

This chapter presents an overall process for developing a strategic security program. It begins with our formal definition of strategic security and then ...

Get IT Systems Management, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.