Information Security Policies and Procedures On-line Self-study Course
2005
Crc Press Inc (Verlag)
978-0-8493-8536-0 (ISBN)
Crc Press Inc (Verlag)
978-0-8493-8536-0 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Enables information security professionals to integrate enterprise-wide policies, procedures and standards into business processes to achieve organization goals. This course describes employee responsibilities, information handling and processing, security tools, program administration and other elements for the safe execution of business tasks.
This web based self-study course enables information security professionals to integrate various enterprise-wide policies, procedures and standards into business processes to achieve organization goals. The course describes how security policies support management initiatives. In addition, the course describes employee responsibilities, information handling and processing, security tools, program administration and other elements needed for the safe execution of business tasks.
Policies, standards, and procedures are key elements of the business process and support the efficient operation of an organization. Policies support management's directions and standards and procedures are used to implement management policies. You will learn how to write clear and concise policies with defined objectives, deadlines, and a communications plan. The course covers Tier 1 (enterprise-wide), Tier 2 (topic-specific) and Tier 3 (application-specific) policies and maps them to national and international standards and procedures.
This web based self-study course enables information security professionals to integrate various enterprise-wide policies, procedures and standards into business processes to achieve organization goals. The course describes how security policies support management initiatives. In addition, the course describes employee responsibilities, information handling and processing, security tools, program administration and other elements needed for the safe execution of business tasks.
Policies, standards, and procedures are key elements of the business process and support the efficient operation of an organization. Policies support management's directions and standards and procedures are used to implement management policies. You will learn how to write clear and concise policies with defined objectives, deadlines, and a communications plan. The course covers Tier 1 (enterprise-wide), Tier 2 (topic-specific) and Tier 3 (application-specific) policies and maps them to national and international standards and procedures.
Introducing information security policies. Managing the implementation plan. Planning for policy development. Developing policies. Classifying information. Developing standards. Developing procedures. Selling policies, standards and procedures.
Erscheint lt. Verlag | 15.11.2005 |
---|---|
Verlagsort | Bosa Roca |
Sprache | englisch |
Maße | 216 x 279 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 0-8493-8536-9 / 0849385369 |
ISBN-13 | 978-0-8493-8536-0 / 9780849385360 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €