Chapter 8: Effective Defense Tactics and Data Protection
Organizational security infrastructures are made of several different layers. While threat intelligence (TI) focuses on informed cyclic security defense and protection based on data and provides an efficient way to stay ahead of cyber threats, an organization's first layer of defense depends on how security is globally integrated into the business operations. The organization must ensure that security best practices and policies are maintained at all costs and at any given point (development, integration, resource management, communication, and so on). It must combine people, processes, and technology to ensure that critical data is protected throughout its entire life cycle. Data and resources' confidentiality, integrity, and availability (CIA) must be preserved and frequently evaluated in transit or at rest.
This chapter focuses on building an effective defensive shield for an organization's security—...