19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In this part . . .<br />

N ow that the hard — or at least technical — stuff is<br />

over with, it’s time to pull everything together, fix<br />

what’s broken, and establish good information security<br />

practices to help you move forward.<br />

First, this part covers reporting the security<br />

vulnerabilities you discover to help get management<br />

buy-in and hopefully more money in your budget to make<br />

things right. This part then covers good practices for<br />

plugging the security holes within your systems. Finally,<br />

this part covers what it takes to manage change within<br />

your information systems for long-term success, including<br />

outsourcing ethical hacking to help ease the burden of<br />

your massive to-do list! That’s what working in IT is all<br />

about anyway, right?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!