Managing network security: Risk staging
โ Scribed by Fred Cohen
- Publisher
- Elsevier Science
- Year
- 1998
- Tongue
- English
- Weight
- 470 KB
- Volume
- 1998
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational' activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.
๐ SIMILAR VOLUMES
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management dec
Properly conducted penetration testing is a viable mechanism for providing practical, "where the rubber meets the road" assessment of a given firewall implementation's overall strength. Management should remember, limitations of a given test when considering the results. References