April 25, 2024
This chapter examines the business aspects of security. These principles and practices form the foundation upon which strong security policies are built. The specific policies for your organization depend on a number of factors, including location, type of business, and employee involvement in network and computer management. You also discover several methods of applying security practices and policies to your network and organization, including the use of security checklists.
Read the full article: TICSA Certification: Information Security Basics
Published in InformIT on 11/22/02
Leave a Reply