The design of an information system inevitably begins with an analysis of the existing setup and associated risks. This step includes an assessment of the company's needs and helps identify the essential assets to protect, allowing the definition of an Information System Security Policy (ISSP). An architecture for the information system can then be defined and deployed, meeting the previously established security requirements. The human factor is the main risk factor, so staff awareness and training are essential. Moreover, attacks are increasingly common and sophisticated, so it is important to rely on existing methods and standards, comply with the legal framework, and regularly update the security policy.
Example scenario:
Here are the SAE projects that required the skill of administering networks and the internet: