The IT staff should avoid the "hack and patch" approach of only installing patches when new vulnerabilities (hacks) are announced. This does not allow for the IT staff to be in a position to monitor systems or prevent intrusions from new or undocumented vulnerabilities. In addition, many "attacks" are designed to be as unobtrusive as possible, and require close attention to the network and systems to identify them.
Information Security Network Risk Management Protecting an organization’s digital assets should start with the system’s backbone
Pages to are hidden for
"Network Risk Management"Please download to view full document