Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 5, Problem 2RQ

Explanation of Solution

Sun Tzu’s two key understandings:

According to Sun Tzu, the two key understandings to success in battle are, know yourself and to know the enemy.

Know yourself:

  • First one must know their identity, examine and understand the information and system which are currently undergoing in the organization.
  • Information should be analyzed and the system which stores, uses and transmit information should be checked repeatedly.
  • These steps should be taken to protect it from risk and to make sure up to which vulnerabilities are they susceptible.
  • Once the process has been identified, analyze what are the measures that have been already taken to protect the system.
  • Moving the asset from place does not really mean that the asset is kept safer.
  • Organizations will start implementing the control mechanisms, but they unfortunately neglect the periodic review, maintenance, revision which are necessary to run the system without risk...

Blurred answer
Students have asked these similar questions
Is the use of technology still necessary, and what strategies do we now employ?
What can we do as a people to prevent more internal strife and exterior disintegration?
Describe the GRANT proclamation and how it pertains to national defense. What kind of legal rights are offered for purchase? What steps must be taken to get them cancelled?
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage