libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

peltier thomas r. - information security policies, procedures, and standards

Information Security Policies, Procedures, and Standards Guidelines for Effective Information Security Management




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
116,98 €
NICEPRICE
111,13 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 12/2001
Edizione: 1° edizione





Note Editore

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities.




Sommario

IntroductionWriting Mechanics and the MessageAttention SpansKey ConceptsTopic Sentence and Thesis StatementThe MessageWriting Don'tsSummaryPolicy DevelopmentIntroductionPolicy DefinitionsFrequently Asked QuestionsPolices are Not EnoughWhat is a PolicyPolicy FormatPolicy ContentProgram Policy ExamplesTopic-Specific Policy StatementsAdditional HintsTopic-Specific SubjectsThings to RememberAdditional ExamplesStandardsIntroductionWhere Does a Standard Go?Policies are not EnoughWhat is a StandardSecurity OrganizationAssets Classification and ControlPersonnel SecurityPhysical and Environmental SecurityComputer and Network ManagementSystems Access ControlBusiness Continuity PlanningComplianceWriting ProceduresIntroductionDefinitionsWriting CommandantsKey Elements in Procedure WritingProcedure ChecklistGetting StartedProcedure StylesCreating a ProcedureSummarySecurity Awareness ProgramIntroductionKey Goals of an Information Security ProgramKey Elements of a Security ProgramSecurity Awareness Program GoalsIdentify Current Training NeedsSecurity Awareness Program DevelopmentMethods Used to Convey the Awareness MessagePresentation Key ElementsTypical Presentation FormatWhen to do AwarenessThe Information Security MessageInformation Security Self-AssessmentVideo SourcesWhy Manage the Process as a ProjectIntroductionFirst Things First - Identify the SponsorDefining the Scope of WorkTime ManagementPolicies and Procedures Project Sample WBSCost ManagementPlanning for QualityManaging Human ResourcesCreating a Communications PlanSummaryMission StatementSetting the ScopeBackground on your PositionBusiness Goals Versus Security GoalsComputer Security ObjectivesMission Statement FormatAllocation of Information Security ResponsibilitiesMission Statement ExamplesSupport for the Mission StatementKey Roles in OrganizationsBusiness ObjectivesReviewInformation Technology - Code of Practice for Information Security ManagementScopeTerms and DefinitionsInformation Security PolicyOrganization SecurityAsset Classification and ControlPersonnel SecurityPhysical and Environmental SecuritySystems Development and MaintenanceBusiness Continuity PlanningComplianceReviewReferences










Altre Informazioni

ISBN:

9780849311376

Condizione: Nuovo
Dimensioni: 10 x 7 in Ø 1.30 lb
Formato: Brossura
Illustration Notes:50 b/w images
Pagine Arabe: 312


Dicono di noi