Writing Information Security Policies

Paperback
from $0.00

Author: Scott Barman

ISBN-10: 157870264X

ISBN-13: 9781578702640

Category: Databases Security

Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy....

Search in google:

Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment—at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.

IStarting the Policy Process11What Information Security Policies Are32Determining Your Policy Needs113Information Security Responsibilities27IIWriting the Security Policies394Physical Security415Authentication and Network Security536Internet Security Policies777Email Security Policies1038Viruses, Worms, and Trojan Horses1119Encryption11710Software Development Policies129IIIMaintaining the Policies14511Acceptable Use Policies14712Compliance and Enforcement15513The Policy Review Process169IVAppendixes175A: Glossary177B: Resources185C: Sample Policies193Index203