O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Summary

To understand the business concerns that drive security policy, activity, and principles, it's essential to understand security practices and how they may be applied to meet any given situation. This explains why general best practice and policies must be tailored to meet an organization's location, type of business, employee needs, and so forth when formulating security policy for any specific application. This also explains why even though there are predictable, pro forma aspects to security policy for any organization, there is really no one-size-fits-all or cookie-cutter approach feasible when formulating a specific security policy.

KEY TERMS

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required