O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Summary

In this chapter, we discussed the importance of a strong, cohesive security policy from a competitive business perspective and from the legal realities organizations find themselves dealing with in today's marketplace. The best first defense from security violations and related problems is a strong security policy. It documents the organization's vision and preparation in addressing various security threats.

KEY TERMS

  • Availability

  • Chain of custody

  • Code of ethics

  • Confidentiality

  • Due care

  • Evidence

  • Guideline

  • Incident

  • Integrity

  • Message

  • Policy

  • Procedure

  • Receiver

  • Sender

  • Standard

A good security policy is really a collection of smaller, targeted policies. Each element of the overall security policy addresses concerns in a specific area. The following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required