Writing Information Security Policies

Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be gra...

Full description

Bibliographic Details
Main Author: Barman, Scott (Author)
Format: Book
Language:English
Published: Indianapolis : Old Tappan : Sams Pearson Education [distributor] Nov. 2001
Indianapolis : Old Tappan : Sams Pearson Education [Distributor] Nov. 2001
Series:Landmark Ser
Landmark Ser
Subjects:
LEADER 05469nam a22007092 b4500
001 7657fa6a-0f39-431b-9f8d-7ca2949a11fd
005 20231210000000.0
008 010815e20011102inua^^^^o||||||||^2|eng|d
010 |a 00105340 
019 |a 1103280023 
020 |a 157870264X  |q (Trade Paper) 
020 |a 9781578702640 
020 |z 157870264X 
020 |z 9781578702640 
024 1 |a 619472702642 
024 3 |a 9781578702640 
035 |a (OCoLC)951664071  |z (OCoLC)1103280023 
035 |a (WaSeSS)ssj0000078859 
037 |b 00023271 
040 |a BIP US  |d WaSeSS  |e rda 
040 |a COO  |b eng  |e pn  |c COO  |d OCLCQ  |d WYU  |d CEF  |d OCLCO  |d VT2  |d OCLCF  |d OCLCQ  |d OCLCO 
049 |a MAIN 
050 0 |a QA76.9.A25B379 2002 
050 4 |a QA76.9.A25B379 2002 
082 0 0 |a 658.4/789  |2 21 
082 0 4 |a 658.4/789  |2 21 
100 1 |a Barman, Scott  |e Author 
100 1 |a Barman, Scott,  |e author 
245 1 0 |a Writing Information Security Policies 
260 |a Indianapolis :  |b Sams  |c Nov. 2001  |a Old Tappan :  |b Pearson Education [distributor] 
264 1 |a Indianapolis :  |b Sams  |c Nov. 2001  |a Old Tappan :  |b Pearson Education [Distributor] 
300 |a 1 online resource (240 p.)  |b ill 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
440 0 |a Landmark Ser 
490 1 |a Landmark Ser 
500 |a Description based on print version record 
506 |a Available for distribution in: USA, CANADA, UNITED KINGDOM, AUSTRALIA, SOUTH AFRICA 
520 8 |a Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies 
520 8 |a Annotation  |b <p>Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.</p> 
521 |a Trade  |b Sams 
596 |a 22 
650 0 |a Computer security  |x Management 
650 0 |a Data protection 
650 4 |a Computer Networks  |x Security Measures 
650 4 |a Internet  |x Security Measures 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Sécurité informatique  |x Gestion 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
652 4 |a Computers  |x Internet  |x Security 
652 4 |a Computers  |x Networking  |x Security 
655 0 |a Electronic books 
776 0 8 |i Print version:  |a Barman, Scott Author  |t Writing Information Security Policies  |d Indianapolis : Sams, Nov. 2001 ; Old Tappan : Pearson Education [Distributor]  |z 9781578702640  |z 157870264X  |w (BIP US)007340775 
776 0 8 |i Print version:  |a Barman, Scott  |t Writing Information Security Policies.  |d Indianapolis : Sams Nov. 2001 Old Tappan : Pearson Education [distributor]  |w (DLC) 00105340 
830 0 |a Landmark Ser  |? UNAUTHORIZED 
999 1 0 |i 7657fa6a-0f39-431b-9f8d-7ca2949a11fd  |l a13755318  |s US-CST  |m writing_information_security_policies______________________________________1102_______sams_a________________________________________barman__scott______________________e 
999 1 0 |i 7657fa6a-0f39-431b-9f8d-7ca2949a11fd  |l 010201180  |s US-NCD  |m writing_information_security_policies______________________________________1102_______sams_a________________________________________barman__scott______________________e 
999 1 1 |l a13755318  |s ISIL:US-CST  |t BKS  |a SUL INTERNET  |b 13755318-1001  |c INTERNET RESOURCE  |d ASIS  |x SUL  |y 13755318-1001  |p UNLOANABLE 
999 1 1 |l 010201180  |s ISIL:US-NCD  |t BKS  |a DUKIR  |x ITNET  |p UNLOANABLE