Writing Information Security Policies

ISBN-10: 157870264X
ISBN-13: 9781578702640
Edition: 2002
Authors: Scott Barman
List price: $34.99 Buy it from $3.00
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Almost every book on network security talks about developing a "security policy" as part of the security planning process. A good security policy should be the basis for every successful security program, yet over 60-percent of companies do not have  More...

New Starting from $38.84
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $34.99
Copyright year: 2002
Publisher: Pearson Education
Publication date: 11/2/2001
Binding: Paperback
Pages: 240
Size: 7.00" wide x 8.75" long x 0.75" tall
Weight: 0.792
Language: English

Almost every book on network security talks about developing a "security policy" as part of the security planning process. A good security policy should be the basis for every successful security program, yet over 60-percent of companies do not have policies or have policies that are out of date. Those references that do talk about security policies provide little information on how to actually prepare one. Fewer still help you develop and implement a good policy document that evolves with your evolving security needs. Writing Information Security Polices will help anyone involved in company seurity write a policy that can be both implemented and updated as needed, weather involved in the management or actual technical side of the business.

Starting the Policy Process
What Information Security Policies Are
About Information Security Policies
Why Policies Are Important
When Policies Should Be Developed
How Policies Should Be Developed
Summary
Determining Your Policy Needs
Identify What Is to Be Protected
Identify From Whom It Is Being Protected
Data Security Considerations
Backups, Archival Storage, and Disposal of Data
Intellectual Property Rights and Policies
Incident Response and Forensics
Summary
Information Security Responsibilities
Management Responsibility
Role of the Information Security Department
Other Information Security Roles
Understanding Security Management and Law Enforcement
Information Security Awareness Training and Support
Summary
Writing the Security Policies
Physical Security
Computer Location and Facility Construction
Facilities Access Controls
Contingency Planning
General Computer Systems Security
Periodic System and Network Configuration Audits
Staffing Considerations
Summary
Authentication and Network Security
Network Addressing and Architecture
Network Access Control
Login Security
Passwords
User Interface
Access Controls
Telecommuting and Remote Access
Summary
Internet Security Policies
Understanding the Door to the Internet
Administrative Responsibilities
User Responsibilities
World Wide Web Policies
Application Responsibilities
VPNs, Extranets, Intranets, and Other Tunnels
Modems and Other Backdoors
Employing PKI and Other Controls
Electronic Commerce
Summary
Email Security Policies
Rules for Using Email
Administration of Email
Use of Email for Confidential Communication
Summary
Viruses, Worms, and Trojan Horses
The Need for Protection
Establishing the Type of Virus Protection
Rules for Handling Third-Party Software
User Involvement with Viruses
Summary
Encryption
Legal Issues
Managing Encryption
Handling Encryption and Encrypted Data
Key Generation Considerations
Key Management
Summary
Software Development Policies
Software Development Processes
Testing and Documentation
Revision Control and Configuration Management
Third-Party Development
Intellectual Property Issues
Summary
Maintaining the Policies
Acceptable Use Policies
Writing the AUP
User Login Responsibilities
Use of Systems and Network
User Responsibilities
Organization's Responsibilities and Disclosures
Common-Sense Guidelines About Speech
Summary
Compliance and Enforcement
Testing and Effectiveness of the Policies
Publishing and Notification Requirements of the Policies
Monitoring, Controls, and Remedies
Administrator's Responsibility
Logging Considerations
Reporting of Security Problems
Considerations When Computer Crimes Are Committed
Summary
The Policy Review Process
Periodic Reviews of Policy Documents
What the Policy Reviews Should Include
The Review Committee
Summary
Appendixes
Glossary
Resources
Incident Response Teams
Other Incident Response Information
Virus Protection
Vendor-Specific Security Information
Security Information Resources
Security Publications
Industry Consortia and Associations
Hacker and "Underground" Organizations
Health Insurance Portability and Accountability Act
Survivability
Cryptography Policies and Regulations
Security Policy References
Sample Policies
Sample Acceptable Use Policy
Sample Email Security Policy
Sample Administrative Policies
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×