O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Data Protection

Information is the most important asset in many industries, so your security systems must be designed to protect it. In fact, many businesses today are based upon information alone—the network and the data it contains is the business. This makes proper valuation and protection of data even more critical. When protecting data, consider the following three key points:

  • Data availability. For information to be useful, it must be available when needed. In recent months, companies have seen a proliferation of attacks designed to disrupt the flow of information on their Web servers and the Internet. These Denial-of-Service (DoS) attacks are designed to halt system operation, make its services unavailable, or at least hurt system performance. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required