CISSP: 3 in 1- Beginner's Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam by Daniel Jones
Author:Daniel Jones [Jones, Daniel]
Language: eng
Format: azw3
Published: 2020-05-06T16:00:00+00:00
Chapter Four
Determining Compliance Requirements
In this chapter, we will be looking into the legal frameworks, how and why compliance is critical to information security. To stay in compliance with the regional, national, state, and other legislation, regulations, and standards always provide efficient and secure governance and control. Other than these requirements, an outstanding and critical requirement is the privacy and the protection of privacy. With the digital information networks, social media, digitized healthcare and other services provide millions of opportunities for external parties to steal and abuse private information of not only the organizations but of the individuals. Chapter four covers these topics comprehensively and gives you an understanding of everything you need to know.
In this chapter, you will learn:
- Contractual, legal, industry standards, and regulatory requirements.
- Classification of legislations and current frameworks.
- Privacy requirements.
- Privacy and data protection frameworks.
For some, the term compliance is not a familiar one. Therefore, first, it is better to start at this point. In the CISSP learning path, the 8th domain is all about Legal, Regulations, Investigations and Compliance. As it sounds, it is about legality and justice. Yes, indeed. As a security professional, one must acquire knowledge on laws and regulations. That is to bring wrongdoers to justice. There are laws about privacy, civil and criminal activities.
In this chapter, we are not going to go deeper into cyber-crime and cyber laws but the organizational requirements about laws, regulations and compliance. Regrettably, the laws were unable to keep up with the phase of technology in terms of development. This is causing a serious issue when we talk about cybercrime.
From an organizational standpoint, it must adhere to national laws, regulations and standards while building and encouraging professional ethics and code of conduct. This is followed by encouraging responsibility and accountability. All of these activities are for the safety and security of the organization as well as to set examples of lawful operations - staying compliant to the enforcements for betterment in other words. This also discourages the unethical and illegal operations from the inside as well as from the outside. This is what compliance is all about. It’s a practice and a discipline.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7402)
Grails in Action by Glen Smith Peter Ledbrook(7296)
Kotlin in Action by Dmitry Jemerov(4638)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4131)
The Age of Surveillance Capitalism by Shoshana Zuboff(3423)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3243)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3028)
Mastering Python for Networking and Security by José Manuel Ortega(2952)
Blockchain Basics by Daniel Drescher(2891)
TCP IP by Todd Lammle(2640)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2612)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2483)
Hands-On Azure for Developers by Kamil Mrzyglod(2412)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2372)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2340)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2313)
The Social Psychology of Inequality by Unknown(2311)
The Art Of Deception by Kevin Mitnick(2298)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2264)