Cargando…

Writing Information Security Policies.

Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be gra...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Barman, Scott (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis : Old Tappan : Sams Pearson Education [distributor] Nov. 2001
Colección:Landmark Ser.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000M 4500
001 OR_ocn951664071
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 010815e20011102inua o 000 0 eng d
040 |a COO  |b eng  |e pn  |c COO  |d OCLCQ  |d WYU  |d CEF  |d OCLCO  |d VT2  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1103280023 
020 |a 9781578702640 
020 |a 157870264X  |q (Trade Paper) 
024 1 |a 619472702642 
024 3 |a 9781578702640 
035 |a (OCoLC)951664071  |z (OCoLC)1103280023 
037 |b 00023271 
050 4 |a QA76.9.A25B379 2002 
082 0 4 |a 658.4/789  |2 21 
049 |a UAMI 
100 1 |a Barman, Scott,  |e author. 
245 1 0 |a Writing Information Security Policies. 
260 |a Indianapolis :  |b Sams  |c Nov. 2001  |a Old Tappan :  |b Pearson Education [distributor] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Landmark Ser. 
520 8 |a Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies. 
521 |a Trade  |b Sams. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Management. 
650 0 |a Data protection. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
776 0 8 |i Print version:  |a Barman, Scott.  |t Writing Information Security Policies.  |d Indianapolis : Sams Nov. 2001 Old Tappan : Pearson Education [distributor]  |w (DLC) 00105340 
830 0 |a Landmark Ser. 
856 4 0 |u https://learning.oreilly.com/library/view/~/157870264X/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP