Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

Chapter 2. Risky Business > Introduction - Pg. 21

CHAPTER Risky Business 2 INFORMATION IN THIS CHAPTER · Applying Risk Management to Information Security · Business-Driven Security Program · Security as an Investment · Qualitative versus Quantitative INTRODUCTION A common view of the Information Security function is that it is all about encryp- tion and firewalls. We are perceived as the group that is always telling the busi- ness what they can't do and is constantly screaming about the vulnerabilities that will bring the organization to the state of ruin. This perception has really hurt the