O'Reilly logo

Selling Information Security to the Board by Alan Calder

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 6: SELF-PREPARATION: BUILDA TRACK RECORD

All information security practitioners know, intellectually, that confidentiality, integrity and availability (C, I and A) are the three key principles of information security management. However, most practitioners actually concentrate more, in their day-to-day environments, on protecting confidentiality and integrity. The concept of ‘security’ doesn’t seem to contain the idea of availability.

However, to the business manager, ‘availability’ is the most important attribute of information. Line managers want to be sure that they, and their people, can access the information they need to do their job, as and when they need it. This business desire for availability often clashes with the practitioner’s ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required