O'Reilly logo

IT Systems Management, Second Edition by Rich Schiesser

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16. Strategic Security

Introduction

Just as IT infrastructures have evolved from mainframes to the Internet, so also have security systems. The process that began primarily as a means to protect mainframe operating systems now must protect applications, databases, networks, and desktops—not to mention the Internet and its companions, extranets, and intranets. While there are dedicated security processes that pertain to each of these entities, there needs to be a strategic security process governing the integration and compatibility of these specialized systems.

This chapter presents an overall process for developing a strategic security program. It begins with our formal definition of strategic security and then ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required