Abstract
This chapter examines the operational processes for enterprise cybersecurity. There are 17 major operational processes and 14 major information systems that support cybersecurity operations. This chapter explains how they all work together to operate an effective cybersecurity program. Additional detail on the operational processes and supporting information systems is in Appendix E.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam
About this chapter
Cite this chapter
Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A. (2015). Operating Enterprise Cybersecurity. In: Enterprise Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6083-7_5
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6083-7_5
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6082-0
Online ISBN: 978-1-4302-6083-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)