Abstract
This chapter addresses all the processes and services in the organization’s information security scope that should be implemented. Processes related to security awareness, training, and simulated attacks are addressed in the next chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Information Governance Initiative. IGI State of the Industry Report: Volume III. Washington, DC: IGI. https://iginitiative.com/wp-content/uploads/The-State-of-IG-Report-Volume-III-highres.pdf. 2018.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
www.offensive-security.com/pwk-oscp/
- 12.
www.offensive-security.com/pen300-osep
- 13.
- 14.
- 15.
- 16.
- 17.
- 18.
- 19.
- 20.
- 21.
- 22.
- 23.
- 24.
- 25.
- 26.
- 27.
- 28.
- 29.
- 30.
- 31.
For a curated list, go to https://github.com/jivoi/awesome-osint.
- 32.
Please see Chapter 9.
- 33.
- 34.
NIST SP 800-37 Rev. 2 from NIST SP 800-160 Vol. 2
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Viegas, V., Kuyucu, O. (2022). Corporate Information Security Processes and Services. In: IT Security Controls. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7799-7_5
Download citation
DOI: https://doi.org/10.1007/978-1-4842-7799-7_5
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-7798-0
Online ISBN: 978-1-4842-7799-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)