Information Security Policies and Procedures - Thomas R. Peltier

Information Security Policies and Procedures

A Practitioner's Reference, Second Edition
Buch | Hardcover
408 Seiten
2004 | 2nd edition
Auerbach (Verlag)
978-0-8493-1958-7 (ISBN)
149,60 inkl. MwSt
Shows how information security must be integrated into various aspects of the business process. This book examines Tier 1, Tier 2, and Tier 3 policies.
Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies.

The book emphasizes how information security must be integrated into all aspects of the business process. It examines the 12 enterprise-wide (Tier 1) policies, and maps information security requirements to each. The text also discusses the need for top-specific (Tier 2) policies and application-specific (Tier 3) policies and details how they map with standards and procedures.

It may be tempting to download some organization’s policies from the Internet, but Peltier cautions against that approach. Instead, he investigates how best to use examples of policies, standards, and procedures toward the achievement of goals. He analyzes the influx of national and international standards, and outlines how to effectively use them to meet the needs of your business.

Thomas R. Peltier

INFORMATION SECURITY POLICIES AND PROCEDURES. Introduction. Why manage this process as a project? Planning and preparation. Developing policies. Asset classification policy. Developing standards. Developing procedures. Creating a table of contents. Understanding how to sell policies, standards, and procedures. Appendix 1A Typical tier 1 policies. Appendix 1B Typical tier 2 policies. Appendix 1C  Sample standards manual. Appendix 1D Sample information security manual. INFORMATION SECURITY REFERENCE GUIDE. Introduction to information security. Fundamentals of information security. Employee responsibilities. Information classification. Information handling. Tools of information security. Information processing. Information security program administration. Baseline organization information security program. Appendix 2A.

Erscheint lt. Verlag 11.6.2004
Zusatzinfo 53 Tables, black and white; 22 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Gewicht 910 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
ISBN-10 0-8493-1958-7 / 0849319587
ISBN-13 978-0-8493-1958-7 / 9780849319587
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00