Ulteriori informazioni
Zusatztext "The path to information security is a long one! but in this book author Thomas Peltier makes the scenery attractive along the way. Peltier walks the reader through [the text] with clarity! completeness! and humor. " - Security Management! June 2005 Informationen zum Autor Thomas R. Peltier Klappentext Peltier illustrates how to develop the related standards, procedures, and guidelines for implementing policy. Each chapter provides advice on the structural mechanics of the various documents, as well as an example of each form. 5/04. Zusammenfassung Shows how information security must be integrated into various aspects of the business process. This book examines Tier 1, Tier 2, and Tier 3 policies. Inhaltsverzeichnis INFORMATION SECURITY POLICIES AND PROCEDURES. Introduction. Why manage this process as a project? Planning and preparation. Developing policies. Asset classification policy. Developing standards. Developing procedures. Creating a table of contents. Understanding how to sell policies, standards, and procedures. Appendix 1A Typical tier 1 policies. Appendix 1B Typical tier 2 policies. Appendix 1C Sample standards manual. Appendix 1D Sample information security manual. INFORMATION SECURITY REFERENCE GUIDE. Introduction to information security. Fundamentals of information security. Employee responsibilities. Information classification. Information handling. Tools of information security. Information processing. Information security program administration. Baseline organization information security program. Appendix 2A.