![](/assets/images/picto-drapeau-france-3a76576a5d60a512053b4612ab58dae5.png)
5. Conclusion
Meeting security requirements does not mean that you can be 100% sure that the security objectives you have set yourself will be achieved. It only means that you are in control of your security: you detect attacks within a "reasonable" time, you check your procedures regularly and are able to identify any flaws, you learn from security incidents, you log access to network services, etc. In a nutshell: you manage your security. In a nutshell: you manage your security.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
![](/assets/images/logo-eti-286623ed91fa802ce039246e516e5852.png)
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusion
References
- (1) - Sécurité informatique : manager et assurer. - AFNOR normes, fév. 2002. http://www.afnor.fr
- (2) - CLUSIF, MEHARI - août 2000. http://www.clusif.asso.fr ...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
![](/assets/images/logo-eti-286623ed91fa802ce039246e516e5852.png)
The Ultimate Scientific and Technical Reference