Writing Information Security Policies
Scott Barman
- 出版商: New Riders
- 出版日期: 2001-11-12
- 定價: $1,100
- 售價: 2.7 折 $299
- 語言: 英文
- 頁數: 240
- 裝訂: Paperback
- ISBN: 157870264X
- ISBN-13: 9781578702640
-
相關分類:
資訊安全
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
$1,570$1,492 -
$920$782 -
$490$417 -
$450$360 -
$880$695 -
$450$351 -
$620$527 -
$780$741 -
$580$493 -
$590$466 -
$280$238 -
$750$585 -
$620$527 -
$680$578 -
$480$374 -
$690$538 -
$720$562 -
$780$663 -
$720$612 -
$560$476 -
$520$406 -
$380$300 -
$750$638 -
$1,110$1,055 -
$450$351
商品描述
Administrators, more technically savvy than their managers, have started to
secure the networks in a way they see as appropriate. When management catches up
to the notion that security is important, system administrators have already
altered the goals and business practices. Although they may be grateful to these
people for keeping the network secure, their efforts do not account for all
assets and business requirementsFinally, someone decides it is time to write a
security policy. Management is told of the necessity of the policy document, and
they support its development. A manager or administrator is assigned to the task
and told to come up with something, and fast!Once security policies are written,
they must be treated as living documents. As technology and business
requirements change, the policy must be updated to reflect the new
environment--at least one review per year. Additionally, policies must include
provisions for security awareness and enforcement while not impeding corporate
goals. This book serves as a guide to writing and maintaining these
all-important security policies.
Table of Contents
I. STARTING THE POLICY PROCESS.
2. Determining Your Policy Needs.
3. Information Security Responsibilities.
II. WRITING THE SECURITY POLICIES.
5. Authentication and Network Security.
6. Internet Security Policies.
7. Email Security Policies.
8. Viruses, Worms, and Trojan Horses.
9. Encryption.
10. Software Development Policies.
III. MAINTAINONG THE POLICIES.
12. Compliance and Enforcement.
13. The Policy Review Process.
IV. APPENDIXES.
Appendix B. Resources.
Appendix C. Sample Policies.
Index.