Introduction

This chapter examines the business aspects of security. These principles and practices form the foundation upon which strong security policies are built. The specific policies for your organization depend on a number of factors, including location, type of business, and employee involvement in network and computer management. You also discover several methods of applying security practices and policies to your network and organization, including the use of security checklists.

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.