Page 196 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 196

Resources will be consumed both by the security mechanisms
               themselves and by the security governance processes. Obviously,

               security mechanisms should consume as few resources as possible and
               impact the productivity or throughput of a system at as low a level as
               feasible. However, every hardware and software countermeasure as
               well as every policy and procedure users must follow will consume
               resources. Being aware of and evaluating resource consumption before
               and after countermeasure selection, deployment, and tuning is an
               important part of security governance and managing the security

               function.

               Managing the security function includes the development and
               implementation of information security strategies. Most of the content
               of the CISSP exam, and hence this book, addresses the various aspects
               of development and implementation of information security strategies.
   191   192   193   194   195   196   197   198   199   200   201