Page 1072 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1072

6.5.1 Internal

                             6.5.2 External


                             6.5.3 Third Party













                                       Throughout this book, you’ve learned about many of
               the different controls that information security professionals
               implement to safeguard the confidentiality, integrity, and availability
               of data. Among these, technical controls play an important role

               protecting servers, networks, and other information processing
               resources. Once security professionals build and configure these
               controls, they must regularly test them to ensure that they continue to
               properly safeguard information.

               Security assessment and testing programs perform regular checks to
               ensure that adequate security controls are in place and that they
               effectively perform their assigned functions. In this chapter, you’ll

               learn about many of the assessment and testing controls used by
               security professionals around the world.
   1067   1068   1069   1070   1071   1072   1073   1074   1075   1076   1077