Summary
In this chapter, you learned about the infrastructure and architecture of information security. This chapter will help the CISM candidate understand important methods, tools, and techniques to develop a security program in an effective and efficient manner.
You also explored security architecture in line with industry best practices and access control requirements including biometrics and authentication factors.
The next chapter will cover the practical aspects of information security program development and management.