Section 2: Closing the Gap: How to Protect the Organization
Here, we'll explore avenues we can take in implementing security controls to achieve our organization's information security goals.
This section contains the following chapters:
- Chapter 3, Designing Secure Information Systems
- Chapter 4, Designing and Protecting Network Security
- Chapter 5, Controlling Access and Managing Identity