Chapter 1
The Security Management Problem
As long as there has been information, there has been the need to protect its confidentiality, integrity, and availability. Although the methods to protect that information have evolved over the years, the complexity needed to ensure that protection hasn’t changed much.
At its core, security management, the process of securing a system and maintaining security throughout its life cycle, requires a broad array of technical, management, and operational steps. To achieve effective security, these steps need to be well-planned, shared with anyone required to help implement them, and tracked along the ...