Book Image

Information Security Handbook - Second Edition

By : Darren Death
Book Image

Information Security Handbook - Second Edition

By: Darren Death

Overview of this book

Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security. Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs. By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner.
Table of Contents (16 chapters)

Continuous Testing and Monitoring

Vulnerabilities have become an inescapable part of the life cycle of modern information systems. Rapid software and hardware development and deployment often lead to inadequately tested products. This approach to technology development often results in an amalgamation of potentially vulnerable systems within an organization. Information security professionals must understand that these vulnerabilities are an inherent aspect of information systems that cannot be eliminated. Continuous vigilance through regular technical testing and monitoring is the key to safeguarding these systems.

Continuous testing and monitoring are essential practices in ensuring the security of an organization’s information systems. This approach involves regularly assessing the systems for potential weaknesses, implementing necessary security measures, and validating the effectiveness of those measures. This continuous cycle helps identify vulnerabilities and mitigate...