Chapter 6
Security Operations and Administration |
C. Karen Stopford
Contents
Security Program Objectives: The C-I-A Triad
Designing a Security Architecture
Authorization and Accountability
Aligning Business, IT, and Security
Security Architecture and Models
Bell–LaPadula Confidentiality Model
Biba and Clark–Wilson Integrity Models
Identity and Access Management
Managing Privileged User Accounts
Outsourcing Security and Managed Security Service Providers
Business Partner Security Controls
Security Policies, Standards, Guidelines, and Procedures ...
Get Official (ISC)2 Guide to the SSCP CBK, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.