Writing Information Security Policies
Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be gra...
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Indianapolis : Old Tappan :
Sams Pearson Education [distributor]
Nov. 2001
Indianapolis : Old Tappan : Sams Pearson Education [Distributor] Nov. 2001 |
Series: | Landmark Ser
Landmark Ser |
Subjects: |
LEADER | 05469nam a22007092 b4500 | ||
---|---|---|---|
001 | 7657fa6a-0f39-431b-9f8d-7ca2949a11fd | ||
005 | 20231210000000.0 | ||
008 | 010815e20011102inua^^^^o||||||||^2|eng|d | ||
010 | |a 00105340 | ||
019 | |a 1103280023 | ||
020 | |a 157870264X |q (Trade Paper) | ||
020 | |a 9781578702640 | ||
020 | |z 157870264X | ||
020 | |z 9781578702640 | ||
024 | 1 | |a 619472702642 | |
024 | 3 | |a 9781578702640 | |
035 | |a (OCoLC)951664071 |z (OCoLC)1103280023 | ||
035 | |a (WaSeSS)ssj0000078859 | ||
037 | |b 00023271 | ||
040 | |a BIP US |d WaSeSS |e rda | ||
040 | |a COO |b eng |e pn |c COO |d OCLCQ |d WYU |d CEF |d OCLCO |d VT2 |d OCLCF |d OCLCQ |d OCLCO | ||
049 | |a MAIN | ||
050 | 0 | |a QA76.9.A25B379 2002 | |
050 | 4 | |a QA76.9.A25B379 2002 | |
082 | 0 | 0 | |a 658.4/789 |2 21 |
082 | 0 | 4 | |a 658.4/789 |2 21 |
100 | 1 | |a Barman, Scott |e Author | |
100 | 1 | |a Barman, Scott, |e author | |
245 | 1 | 0 | |a Writing Information Security Policies |
260 | |a Indianapolis : |b Sams |c Nov. 2001 |a Old Tappan : |b Pearson Education [distributor] | ||
264 | 1 | |a Indianapolis : |b Sams |c Nov. 2001 |a Old Tappan : |b Pearson Education [Distributor] | |
300 | |a 1 online resource (240 p.) |b ill | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
440 | 0 | |a Landmark Ser | |
490 | 1 | |a Landmark Ser | |
500 | |a Description based on print version record | ||
506 | |a Available for distribution in: USA, CANADA, UNITED KINGDOM, AUSTRALIA, SOUTH AFRICA | ||
520 | 8 | |a Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies | |
520 | 8 | |a Annotation |b <p>Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.</p> | |
521 | |a Trade |b Sams | ||
596 | |a 22 | ||
650 | 0 | |a Computer security |x Management | |
650 | 0 | |a Data protection | |
650 | 4 | |a Computer Networks |x Security Measures | |
650 | 4 | |a Internet |x Security Measures | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 6 | |a Sécurité informatique |x Gestion | |
650 | 7 | |a Computer security |x Management |2 fast | |
650 | 7 | |a Data protection |2 fast | |
652 | 4 | |a Computers |x Internet |x Security | |
652 | 4 | |a Computers |x Networking |x Security | |
655 | 0 | |a Electronic books | |
776 | 0 | 8 | |i Print version: |a Barman, Scott Author |t Writing Information Security Policies |d Indianapolis : Sams, Nov. 2001 ; Old Tappan : Pearson Education [Distributor] |z 9781578702640 |z 157870264X |w (BIP US)007340775 |
776 | 0 | 8 | |i Print version: |a Barman, Scott |t Writing Information Security Policies. |d Indianapolis : Sams Nov. 2001 Old Tappan : Pearson Education [distributor] |w (DLC) 00105340 |
830 | 0 | |a Landmark Ser |? UNAUTHORIZED | |
999 | 1 | 0 | |i 7657fa6a-0f39-431b-9f8d-7ca2949a11fd |l a13755318 |s US-CST |m writing_information_security_policies______________________________________1102_______sams_a________________________________________barman__scott______________________e |
999 | 1 | 0 | |i 7657fa6a-0f39-431b-9f8d-7ca2949a11fd |l 010201180 |s US-NCD |m writing_information_security_policies______________________________________1102_______sams_a________________________________________barman__scott______________________e |
999 | 1 | 1 | |l a13755318 |s ISIL:US-CST |t BKS |a SUL INTERNET |b 13755318-1001 |c INTERNET RESOURCE |d ASIS |x SUL |y 13755318-1001 |p UNLOANABLE |
999 | 1 | 1 | |l 010201180 |s ISIL:US-NCD |t BKS |a DUKIR |x ITNET |p UNLOANABLE |